IEEE/CAA Journal of Automatica Sinica
Citation: | Yong Xie, Liangjiao Liu, Renfa Li, Jianqiang Hu, Yong Han and Xin Peng, "Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 422-430, 2015. |
[1] |
Furst S. Challenges in the design of automotive software. In: Proceedings of the 2010 Design, Automation and Test in Europe Conference and Exhibition (DATE). Dresden: IEEE, 2010. 256-258
|
[2] |
Li R F, Xie Y, and etc. Survery of cyber-physical systems. Journal of Research and Development, 2012, 49(6): 1149-1161 (in Chinese)
|
[3] |
Sagstetter F, Lukasiewycz M, Steinhorst S, Wolf M, Bouard A, Harris W R, Jha S, Peyrin T, Poschmann A, Chakraborty S. Security challenges in automotive hardware/software architecture design. In: Proceedings of the 2013 Design, Automation, and Test in Europe Conference and Exhibition (DATE). Grenoble, France: IEEE, 2013. 458-463
|
[4] |
Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S. Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security [Online], available: https://www.usenix.org/legacy/events/sec11/tech/full papers/Checkoway.pdf, August 8, 2011.
|
[5] |
Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S. Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP). Oakland, CA: IEEE, 2010. 447-462
|
[6] |
Tuohy S, Glavin M, Hughes C, Jones E, Trivedi M, Kilmartin L. Intravehicle networks: a review. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(2): 534-545
|
[7] |
Hoppe T, Kiltz S, Dittmann J. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliability Engineering and System Safety, 2011, 96(1): 11-25
|
[8] |
Nilsson D K, Larson U E, Jonsson E. Efficient in-vehicle delayed data authentication based on compound message authentication codes. In: Proceedings of the 68th IEEE Vehicular Technology Conference. Calgary, BC: IEEE, 2008. 1-5
|
[9] |
Groza B, Murvay S, van Herrewege A, Verbauwhede I. LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Proceedings of the 11th International Conference on Cryptology and Network Security (CANS). Darmstadt: Springer, 2012. 185-200
|
[10] |
Han K, Weimerskirch A, Shin K G. Automotive cybersecurity for invehicle communication. IQT Quarterly, 2014, 6(1): 22-25
|
[11] |
Sandstrom K, Norstom C, Ahlmark M. Frame packing in real-time communication. In: Proceedings of the 7th International Conference on Real-Time Computing Systems and Applications (RTCSA). Cheju Island: IEEE, 2000. 399-403
|
[12] |
Polzlbauer F, Bate I, Brenner E. On extensible networks for embedded systems. In: Proceedings of the 20th IEEE International Conference and Workshops on the Engineering of Computer Based Systems (ECBS). Scottsdale, AZ: IEEE, 2013. 69-77
|
[13] |
Polzlbauer F, Bate I, Brenner E. Optimized frame packing for embedded systems. IEEE Embedded Systems Letters, 2012, 4(3): 65-68
|
[14] |
Saket R, Navet N. Frame packing algorithms for automotive applications. Journal of Embedded Computing, 2006, 2: 93-102
|
[15] |
Pop P, Eles P, Peng Z B. Schedulability-driven frame packing for multicluster distributed embedded systems. ACM Transactions on Embedded Computing Systems, 2005, 4(1): 112-140
|
[16] |
Zheng W, Zhu Q, Di Natale M, Vincentelli A S. Definition of task allocation and priority assignment in hard real-time distributed systems. In: Proceedings of 28th IEEE International Real-Time Systems Symposium. Tucson, AZ: IEEE, 2007. 161-170
|
[17] |
Zhu Q, Yang Y, Scholte E, Di Natale M, Sangiovanni-Vincentelli A. Optimizing extensibility in hard real-time distributed systems. In: Proceedings of the 15th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). San Francisco, CA: IEEE, 2009. 275-284
|
[18] |
Lin C W, Zhu Q, Phung C, Sangiovanni-Vincentelli A. Securityaware mapping for CAN-based real-time distributed automotive systems. In: Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). San Jose, CA: IEEE, 2013. 115-121
|
[19] |
Lin C W, Sangiovanni-Vincentelli A. Cyber-security for the controller area network (CAN) communication protocol. In: Proceedings of the 2012 International Conference on Cyber Security. Washington, DC: IEEE, 2012. 1-7
|
[20] |
Davis R I, Burns A, Bril R J, Lukkien J J. Controller area network (CAN) schedulability analysis: refuted, revisited and revised. Real-Time Systems, 2007, 35(3): 239-272
|