{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:51:05Z","timestamp":1725519065871},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_19","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T15:53:29Z","timestamp":1221839609000},"page":"207-220","source":"Crossref","is-referenced-by-count":16,"title":["Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles"],"prefix":"10.1007","author":[{"given":"Dennis K.","family":"Nilsson","sequence":"first","affiliation":[]},{"given":"Ulf E.","family":"Larson","sequence":"additional","affiliation":[]},{"given":"Erland","family":"Jonsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"See, W.-B.: Vehicle ECU Classification and Software Architectural Implications. Technical report, Feng Chia University, Taiwan (2006)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Miucic, R., Mahmud, S.M.: An In-Vehicle Distributed Technique for Remote Programming of Vehicles\u2019 Embedded Software. Technical report, Electrical and Computer Engineering Department, Wayne State University, Detroit, MI 48202 USA (2005)","DOI":"10.4271\/2005-01-0313"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E., Jonsson, E.: Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. Technical report, Chalmers University of Technology, 2008:02 (2008)","DOI":"10.1007\/978-3-540-87698-4_19"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Mahmud, S.M., Shanker, S., Hossain, I.: Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links. In: Proceedings of IEEE Intelligent Vehicles Symposium, pp. 587\u2013592 (2005)","DOI":"10.1109\/IVS.2005.1505167"},{"issue":"5","key":"19_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M. Raya","year":"2006","unstructured":"Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing Vehicular Communications. IEEE Wireless Communications\u00a013(5), 8\u201315 (2006)","journal-title":"IEEE Wireless Communications"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Shavit, M., Gryc, A., Miucic, R.: Firmware Update over the Air (FOTA) for Automotive Industry. Technical Report 2007-01-3523, SAE (2007)","DOI":"10.4271\/2007-01-3523"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Miucic, R., Mahmud, S.M.: Wireless Multicasting for Remote Software Upload in Vehicles with Realistic Vehicle Movement. Technical report, Electrical and Computer Engineering Department, Wayne State University, Detroit, MI 48202 USA (2005)","DOI":"10.4271\/2005-01-0323"},{"key":"19_CR8","unstructured":"Parrillo, L.C.: Wireless motor vehicle diagnostic and software upgrade system. U.S. patent 5442553 (1995)"},{"key":"19_CR9","unstructured":"Lightner, B., Botrego, D., Myers, C., Lowrey, L.H.: Wireless diagnostic system and method for monitoring vehicles. U.S. patent 6636790 (2003)"},{"key":"19_CR10","unstructured":"Suman, M.J., Zeinstra, M.L.: Remote vehicle programming system. U.S. patent 5479157 (1995)"},{"key":"19_CR11","unstructured":"Chen, C.-H.: Vehicle security system having wireless function-programming capability. U.S. patent 6184779 (2001)"},{"key":"19_CR12","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in Automotive Bus Systems. In: Workshop on Embedded IT-Security in Cars, Bochum, Germany (November 2004)"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1102219.1102223","volume-title":"Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"M. Raya","year":"2005","unstructured":"Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11\u201321. ACM Press, New York (2005)"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR15","unstructured":"Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents (SAND98-8667) (1998), http:\/\/www.cert.org\/research\/taxonomy_988667.pdf"},{"key":"19_CR16","unstructured":"Hui, J.: Deluge 2.0 - TinyOS Network Programming Manual (2005), http:\/\/www.cs.berkeley.edu\/~jwhui\/research\/deluge\/deluge-manual.pdf"},{"key":"19_CR17","unstructured":"IEEE. 1609.2. Standard for Wireless Access in Vehicular Networks (2004)"},{"key":"19_CR18","unstructured":"Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate Revocation in Vehicular Networks. Technical report, Laboratory for computer Communications and Applications (LCA), EPFL, Switzerland, 2006. LCA-Report-2006-006."},{"key":"19_CR19","unstructured":"US-CERT. Current Malware Threats and Mitigation Strategies (2005), http:\/\/www.us-cert.gov\/reading_room\/malware-threats-mitigation.pdf"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Secure Firmware Updates over the Air in Intelligent Vehicles. In: Proceedings of the First IEEE Vehicular Networking & Applications Workshop (Vehi-Mobi), pp. 380\u2013384 (2008)","DOI":"10.1109\/ICCW.2008.78"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Levi, A., Savas, E.: Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. In: Proceedings of the Eighth IEEE International Symposium on Computers and Communications, pp. 1245\u20131250 (2003)","DOI":"10.1109\/ISCC.2003.1214285"},{"key":"19_CR22","unstructured":"Network\u00a0Working Group. The TLS Protocol Version 1.0 (1999)"},{"key":"19_CR23","volume-title":"Proceedings of the First ACM International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics)","author":"D.K. Nilsson","year":"2008","unstructured":"Nilsson, D.K., Larson, U.E.: Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks. In: Proceedings of the First ACM International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics). ACM Press, New York (2008)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: A static analysis tool for detecting web application vulnerabilities. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P), pp. 258\u2013263 (2006)","DOI":"10.1109\/SP.2006.29"},{"key":"19_CR25","unstructured":"Trusted\u00a0Computing Group. Trusted Platform Module Specification (2003), https:\/\/www.trustedcomputinggroup.org\/specs\/TPM"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E., Jonsson, E.: Efficient In-Vehicle Delayed Data Authentication based on Compound Message Authentication Codes. In: Proceedings of the IEEE 68th Vehicular Technology Conference (VTC2008-Fall) (2008)","DOI":"10.1109\/VETECF.2008.259"},{"key":"19_CR27","unstructured":"Deal, R.: Cisco Router Firewall Security. Cisco Press (2004)"},{"key":"19_CR28","unstructured":"Network\u00a0Working Group. Stream Control Transmission Protocol (SCTP) Specification (2006)"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Phung, P.H., Larson, U.E.: Vehicle ECU Classification Based on Safety-Security Characteristics. In: Proceedings of the 13th International Conference on Road Transport and Information Control (RTIC) (2008)","DOI":"10.1049\/ic.2008.0810"},{"key":"19_CR30","unstructured":"Hoppe, T., Dittman, J.: Sniffing\/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In: Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria (2007)"},{"key":"19_CR31","unstructured":"Nilsson, D.K., Larson, U.E.: Simulated Attacks on CAN Buses: Vehicle virus. In: Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks (ASIACSN). ACTA Press (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:05:47Z","timestamp":1606165547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}