Serveur d'exploration sur Heinrich Schütz

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures

Identifieur interne : 001501 ( Main/Corpus ); précédent : 001500; suivant : 001502

Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures

Auteurs : Tobias Hoppe ; Stefan Kiltz ; Jana Dittmann

Source :

RBID : ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B

Abstract

Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.

Url:
DOI: 10.1007/978-3-540-87698-4_21

Links to Exploration step

ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-87698-4_21</idno>
<idno type="url">https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/pdf</idno>
<idno type="wicri:Area/Main/Corpus">001501</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation>
<mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<idno type="DOI">10.1007/978-3-540-87698-4_21</idno>
<idno type="ChapterID">Chap21</idno>
<idno type="ChapterID">21</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Tobias Hoppe</name>
<affiliations>
<json:string>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</json:string>
<json:string>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Stefan Kiltz</name>
<affiliations>
<json:string>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</json:string>
<json:string>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jana Dittmann</name>
<affiliations>
<json:string>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</json:string>
<json:string>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</json:string>
</affiliations>
</json:item>
</author>
<subject>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>Automotive</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>IT-Security</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>Safety</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>Practical tests</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>Exemplary threats and countermeasures</value>
</json:item>
</subject>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</abstract>
<qualityIndicators>
<score>5.9</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>5</keywordCount>
<abstractCharCount>498</abstractCharCount>
<pdfWordCount>6259</pdfWordCount>
<pdfCharCount>37390</pdfCharCount>
<pdfPageCount>14</pdfPageCount>
<abstractWordCount>75</abstractWordCount>
</qualityIndicators>
<title>Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<genre>
<json:string>Book Chapter</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>book series</json:string>
</genre>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2008</copyrightDate>
</serie>
<host>
<volume>5219</volume>
<editor>
<json:item>
<name>Michael D. Harrison</name>
<affiliations>
<json:string>School of Computing Science, Newcastle University, Claremont Tower, NE1 7RU, Newcastle upon Tyne, UK</json:string>
<json:string>E-mail: michael.harrison@ncl.ac.uk</json:string>
</affiliations>
</json:item>
<json:item>
<name>Mark-Alexander Sujan</name>
<affiliations>
<json:string>Health Sciences Research Institute, University of Warwick, Coventry, CV4 7AL, UK</json:string>
<json:string>E-mail: m-a.sujan@warwick.ac.uk</json:string>
</affiliations>
</json:item>
</editor>
<pages>
<last>248</last>
<first>235</first>
</pages>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Software Engineering/Programming and Operating Systems</value>
</json:item>
<json:item>
<value>Coding and Information Theory</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
<json:item>
<value>Special Purpose and Application-Based Systems</value>
</json:item>
<json:item>
<value>Logics and Meanings of Programs</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-87697-7</json:string>
</isbn>
<genre>
<json:string>book series</json:string>
</genre>
<language>
<json:string>unknown</json:string>
</language>
<eisbn>
<json:string>978-3-540-87698-4</json:string>
</eisbn>
<title>Computer Safety, Reliability, and Security</title>
<copyrightDate>2008</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-87698-4</json:string>
</doi>
</host>
<copyrightDate>2008</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-87698-4_21</json:string>
</doi>
<id>5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2008</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author>
<persName>
<forename type="first">Tobias</forename>
<surname>Hoppe</surname>
</persName>
<email>tobias.hoppe@iti.cs.uni-magdeburg.de</email>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
</author>
<author>
<persName>
<forename type="first">Stefan</forename>
<surname>Kiltz</surname>
</persName>
<email>stefan.kiltz@iti.cs.uni-magdeburg.de</email>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
</author>
<author>
<persName>
<forename type="first">Jana</forename>
<surname>Dittmann</surname>
</persName>
<email>jana.dittmann@iti.cs.uni-magdeburg.de</email>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Computer Safety, Reliability, and Security</title>
<title level="m" type="sub">27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings</title>
<idno type="pISBN">978-3-540-87697-7</idno>
<idno type="eISBN">978-3-540-87698-4</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-87698-4</idno>
<idno type="BookID">978-3-540-87698-4</idno>
<idno type="BookTitleID">182447</idno>
<idno type="BookSequenceNumber">5219</idno>
<idno type="BookVolumeNumber">5219</idno>
<idno type="BookChapterCount">36</idno>
<editor>
<persName>
<forename type="first">Michael</forename>
<forename type="first">D.</forename>
<surname>Harrison</surname>
</persName>
<email>michael.harrison@ncl.ac.uk</email>
<affiliation>School of Computing Science, Newcastle University, Claremont Tower, NE1 7RU, Newcastle upon Tyne, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Mark-Alexander</forename>
<surname>Sujan</surname>
</persName>
<email>m-a.sujan@warwick.ac.uk</email>
<affiliation>Health Sciences Research Institute, University of Warwick, Coventry, CV4 7AL, UK</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2008"></date>
<biblScope unit="volume">5219</biblScope>
<biblScope unit="page" from="235">235</biblScope>
<biblScope unit="page" to="248">248</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2008</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<idno type="DOI">10.1007/978-3-540-87698-4_21</idno>
<idno type="ChapterID">Chap21</idno>
<idno type="ChapterID">21</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2008</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I14002</label>
<label>I15041</label>
<label>I14050</label>
<label>I13030</label>
<label>I1603X</label>
<label>I24067</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Software Engineering/Programming and Operating Systems</term>
</item>
<item>
<term>Coding and Information Theory</term>
</item>
<item>
<term>Systems and Data Security</term>
</item>
<item>
<term>Special Purpose and Application-Based Systems</term>
</item>
<item>
<term>Logics and Meanings of Programs</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2008">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-1">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-87698-4</BookID>
<BookTitle>Computer Safety, Reliability, and Security</BookTitle>
<BookSubTitle>27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings</BookSubTitle>
<BookVolumeNumber>5219</BookVolumeNumber>
<BookSequenceNumber>5219</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-87698-4</BookDOI>
<BookTitleID>182447</BookTitleID>
<BookPrintISBN>978-3-540-87697-7</BookPrintISBN>
<BookElectronicISBN>978-3-540-87698-4</BookElectronicISBN>
<BookChapterCount>36</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2008</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I14002" Priority="1" Type="Secondary">Software Engineering/Programming and Operating Systems</BookSubject>
<BookSubject Code="I15041" Priority="2" Type="Secondary">Coding and Information Theory</BookSubject>
<BookSubject Code="I14050" Priority="3" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="I13030" Priority="4" Type="Secondary">Special Purpose and Application-Based Systems</BookSubject>
<BookSubject Code="I1603X" Priority="5" Type="Secondary">Logics and Meanings of Programs</BookSubject>
<BookSubject Code="I24067" Priority="6" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>Michael</GivenName>
<GivenName>D.</GivenName>
<FamilyName>Harrison</FamilyName>
</EditorName>
<Contact>
<Email>michael.harrison@ncl.ac.uk</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Mark-Alexander</GivenName>
<FamilyName>Sujan</FamilyName>
</EditorName>
<Contact>
<Email>m-a.sujan@warwick.ac.uk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff1">
<OrgDivision>School of Computing Science</OrgDivision>
<OrgName>Newcastle University</OrgName>
<OrgAddress>
<Street>Claremont Tower</Street>
<Postcode>NE1 7RU</Postcode>
<City>Newcastle upon Tyne</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgDivision>Health Sciences Research Institute</OrgDivision>
<OrgName>University of Warwick</OrgName>
<OrgAddress>
<City>Coventry</City>
<State>CV4 7AL</State>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part5">
<PartInfo TocLevels="0">
<PartID>5</PartID>
<PartSequenceNumber>5</PartSequenceNumber>
<PartTitle>Security</PartTitle>
<PartChapterCount>6</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Computer Safety, Reliability, and Security</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap21" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>21</ChapterID>
<ChapterDOI>10.1007/978-3-540-87698-4_21</ChapterDOI>
<ChapterSequenceNumber>21</ChapterSequenceNumber>
<ChapterTitle Language="En">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</ChapterTitle>
<ChapterFirstPage>235</ChapterFirstPage>
<ChapterLastPage>248</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2008</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>5</PartID>
<BookID>978-3-540-87698-4</BookID>
<BookTitle>Computer Safety, Reliability, and Security</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff3">
<AuthorName DisplayOrder="Western">
<GivenName>Tobias</GivenName>
<FamilyName>Hoppe</FamilyName>
</AuthorName>
<Contact>
<Email>tobias.hoppe@iti.cs.uni-magdeburg.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff3">
<AuthorName DisplayOrder="Western">
<GivenName>Stefan</GivenName>
<FamilyName>Kiltz</FamilyName>
</AuthorName>
<Contact>
<Email>stefan.kiltz@iti.cs.uni-magdeburg.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff3">
<AuthorName DisplayOrder="Western">
<GivenName>Jana</GivenName>
<FamilyName>Dittmann</FamilyName>
</AuthorName>
<Contact>
<Email>jana.dittmann@iti.cs.uni-magdeburg.de</Email>
</Contact>
</Author>
<Affiliation ID="Aff3">
<OrgDivision>ITI Research Group on Multimedia and Security</OrgDivision>
<OrgName>Otto-von-Guericke University of Magdeburg</OrgName>
<OrgAddress>
<Street>Universitaetsplatz 2</Street>
<Postcode>39106</Postcode>
<City>Magdeburg</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</Para>
</Abstract>
<KeywordGroup Language="En">
<Heading>Keywords</Heading>
<Keyword>Automotive</Keyword>
<Keyword>IT-Security</Keyword>
<Keyword>Safety</Keyword>
<Keyword>Practical tests</Keyword>
<Keyword>Exemplary threats and countermeasures</Keyword>
</KeywordGroup>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
</titleInfo>
<name type="personal">
<namePart type="given">Tobias</namePart>
<namePart type="family">Hoppe</namePart>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
<affiliation>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Stefan</namePart>
<namePart type="family">Kiltz</namePart>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
<affiliation>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jana</namePart>
<namePart type="family">Dittmann</namePart>
<affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</affiliation>
<affiliation>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [research-article]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2008</dateIssued>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computer Safety, Reliability, and Security</title>
<subTitle>27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Michael</namePart>
<namePart type="given">D.</namePart>
<namePart type="family">Harrison</namePart>
<affiliation>School of Computing Science, Newcastle University, Claremont Tower, NE1 7RU, Newcastle upon Tyne, UK</affiliation>
<affiliation>E-mail: michael.harrison@ncl.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Mark-Alexander</namePart>
<namePart type="family">Sujan</namePart>
<affiliation>Health Sciences Research Institute, University of Warwick, Coventry, CV4 7AL, UK</affiliation>
<affiliation>E-mail: m-a.sujan@warwick.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14002">Software Engineering/Programming and Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15041">Coding and Information Theory</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13030">Special Purpose and Application-Based Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I1603X">Logics and Meanings of Programs</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-87698-4</identifier>
<identifier type="ISBN">978-3-540-87697-7</identifier>
<identifier type="eISBN">978-3-540-87698-4</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">182447</identifier>
<identifier type="BookID">978-3-540-87698-4</identifier>
<identifier type="BookChapterCount">36</identifier>
<identifier type="BookVolumeNumber">5219</identifier>
<identifier type="BookSequenceNumber">5219</identifier>
<identifier type="PartChapterCount">6</identifier>
<part>
<date>2008</date>
<detail type="part">
<title>Security</title>
</detail>
<detail type="volume">
<number>5219</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>235</start>
<end>248</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</identifier>
<identifier type="DOI">10.1007/978-3-540-87698-4_21</identifier>
<identifier type="ChapterID">Chap21</identifier>
<identifier type="ChapterID">21</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<monogr>
<title level="m" type="main">Viruses coming aboard?, Viruslist.com Weblog</title>
<author>
<persName>
<forename type="first">E</forename>
<surname>Kaspersky</surname>
</persName>
</author>
<imprint>
<date type="published" when="2005-01-24"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<analytic>
<title level="a" type="main">Unusual Car Navigation Tricks: Injecting RDS-TMC Traffic Information Signals</title>
<author>
<persName>
<forename type="first">A</forename>
<surname>Barisani</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">B</forename>
<surname>Daniele</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Can Sec West</title>
<meeting>
<address>
<addrLine>Vancouver</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<monogr>
<title level="m" type="main">Car-2-Car Communication Consortium</title>
<imprint>
<date type="published" when="2008-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Future Perspectives: The Car and its IP- Address -A Potential Safety and Security Risk Assessment</title>
<author>
<persName>
<forename type="first">A</forename>
<surname>Lang</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Dittmann</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Kiltz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Hoppe</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">SAFECOMP 2007</title>
<editor>Saglietti, F., Oster, N.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<monogr>
<title></title>
<author>
<persName>
<forename type="first">Bosch</forename>
<surname>Can</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Website</forename>
</persName>
</author>
<imprint>
<date type="published" when="2008-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">State of the Art: Embedding Security in Vehicles</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Wolf</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Weimerskirch</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Wollinger</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">EURASIP Journal on Embedded Systems</title>
<imprint>
<biblScope unit="volume">16</biblScope>
<date type="published" when="2007"></date>
</imprint>
</monogr>
<note>Article. ID 74706</note>
</biblStruct>
<biblStruct xml:id="b6">
<monogr>
<title level="m" type="main">Remote keyless entry system for cars and buildings is hacked</title>
<imprint>
<date type="published" when="2008"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<analytic>
<title></title>
</analytic>
<monogr>
<title level="m">HIS: Herstellerinitiative Software Vector Informatik</title>
<imprint>
<date type="published" when="2008-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b8">
<analytic>
<title level="a" type="main">Sniffing/Replay Attacks on CAN Buses: A Simulated Attack on the Electric Window Lift Classified using an Adapted CERT Taxonomy</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Hoppe</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Dittmann</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">2nd Workshop on Embedded Systems Security</title>
<imprint>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b9">
<monogr>
<title level="m" type="main">Exemplary Automotive Attack Scenarios: Trojan horses for Electronic Throttle Control System (ETC) and replay attacks on the power window system Automotive Security -VDI-Berichte 2016, 23. VDI/VW Gemeinschaftstagung Automotive Security</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Hoppe</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Kiltz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Lang</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Dittmann</surname>
</persName>
</author>
<imprint>
<date type="published" when="2007-11-28"></date>
<publisher>VDI-Verlag</publisher>
<biblScope unit="page" from="165" to="183"></biblScope>
<pubPlace>Wolfsburg</pubPlace>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b10">
<analytic>
<title level="a" type="main">Vortäuschen von Komponentenfunktionalität im Automobil: Safety-und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Hoppe</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Dittmann</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Sicherheit</title>
<imprint>
<publisher>Sicherheit -Schutz und Zuverlässigkeit</publisher>
<publisher>Sicherheit -Schutz und Zuverlässigkeit</publisher>
<biblScope unit="page" from="341" to="353"></biblScope>
<date type="published" when="2008-04"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b11">
<monogr>
<title level="m" type="main">FlexRay -The communication system for advanced automotive control applications</title>
<imprint>
<date type="published" when="2008-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b12">
<analytic>
<title level="a" type="main">A Taxonomy of Intrusion Response Systems</title>
<author>
<persName>
<forename type="first">N</forename>
<surname>Stakhanova</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Basu</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Wong</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">nternational Journal of Information and Computer Security</title>
<imprint>
<biblScope unit="volume">1</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="169" to="184"></biblScope>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b13">
<monogr>
<title level="m" type="main">IDS als zukünftige Ergänzung automotiver IT- Sicherheit</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Hoppe</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Kiltz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Dittmann</surname>
</persName>
</author>
<imprint>
<date type="published" when="2008-06-24"></date>
<publisher>DACH Security</publisher>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b14">
<analytic>
<title></title>
<author>
<persName>
<forename type="first">Website</forename>
<surname>Kienzle-Automotive</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">product page of the Unfalldatenspeicher UDS system</title>
<imprint>
<date type="published" when="2008-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b15">
<analytic>
<title level="a" type="main">Secure Hardware in Automotive Applications In: 5 th escar conference – Embedded Security in Cars</title>
<author>
<persName>
<forename type="first">Jan</forename>
<surname>Pelzl</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Trusted Computing Group</title>
<imprint>
<biblScope unit="volume">7</biblScope>
<biblScope unit="issue">18</biblScope>
<date type="published" when="2007-11-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b16">
<monogr>
<title level="m" type="main">Trusted Computing for Automotive Systems; In: Automotive Security -VDI-Berichte 2016, 23. VDI/VW Gemeinschaftstagung Automotive Security</title>
<author>
<persName>
<forename type="first">A</forename>
<surname>Bogdanov</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Eisenbarth</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Wolf</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Wollinger</surname>
</persName>
</author>
<imprint>
<date type="published" when="2007-11"></date>
<publisher>VDI-Verlag</publisher>
<biblScope unit="page" from="27" to="28"></biblScope>
<pubPlace>Wolfsburg, Germany</pubPlace>
</imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/SchutzV1/Data/Main/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001501 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Corpus/biblio.hfd -nk 001501 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    SchutzV1
   |flux=    Main
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B
   |texte=   Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
}}

Wicri

This area was generated with Dilib version V0.6.38.
Data generation: Mon Feb 8 17:34:10 2021. Site generation: Mon Feb 8 17:41:23 2021