Huq, N.; Kropotov, V.; Lin, P. & Vosseler, R. (2024). Opportunities, monetization, and cybersecurity threats in the connected vehicle landscape. escar USA. https://doi.org/10.5281/zenodo.18715954
Irmscher, T.; Enderle, T.; Ourad, A. & Pelletier, Z. (2024). Full-vehicle testing: The silver bullet for cybersecurity homologation? escar USA. https://doi.org/10.5281/zenodo.18716229
Lee, Hu.; Lee, Hy.; Jun, S. & Kim, H.K. (2024). Expanding the attack scenarios of SAE J1939: A comprehensive analysis of established and novel vulnerabilities in transport protocol. escar USA. https://doi.org/10.5281/zenodo.18715820
Menon, S.; Sapin, E.; Mahbub, S.H.; Ge, J.; Zhang L. & Brendl, M. (2024). Towards automated live-patching of AUTOSAR adaptive applications. escar USA. https://doi.org/10.5281/zenodo.18716134
Pimentel, J. (2024). Elicitation of privacy requirements and design specifications for new automotive product designs and implications for current automotive privacy standardization. escar USA. https://doi.org/10.5281/zenodo.18715899
Sakon, T.; Fujii, K.; Matsuda, H. & Hashimoto, H. (2024). Weakness analysis method using public weakness emulations in the product development phase. escar USA. https://doi.org/10.5281/zenodo.18716177
Veredas, R.P. & Mehaboobe, Y. (2024). Exploring the risks in connected fleets: A study of two real-world cases. escar USA. https://doi.org/10.5281/zenodo.18716041
2023:
Jepson, J.; Mukherjee, S. & Daily, J. (2023). CANLay: A user-centered overlay for in-vehicle data dissemination in a network virtualized testbed. escar USA. https://doi.org/10.5281/zenodo.18714764
Kayas, G.; Pelletier, Z.; Gordon, D.; Arnston, T. & Payton, J. (2023). AI-assisted vulnerability analysis and classification framework for UDS on CAN-bus fuzzer. escar USA. https://doi.org/10.5281/zenodo.18714709
Mott, C.; Pereira, S.; Johnson, M. & Mikulski, D. (2023). Uptane automotive secure software update framework applied to robotic and autonomous systems. escar USA. https://doi.org/10.5281/zenodo.18715705
Rathweg, A.; Osman, A.; Fleig, A.; Katsigianni, E. & Tschache, A. (2023). Impacts of post-quantum cryptography on automotive security: A case study. escar USA. https://doi.org/10.5281/zenodo.18715769
2022:
Hirano, R.; Kishikawa, T.; Ujiie, Y.; Haga, T.; Matsushima, H.; Imamoto, Y.; Yokota, K. & Anzai, J. (2022). Runtime security of virtualization platform for cockpit domain controller. escar USA. https://doi.org/10.5281/zenodo.18714517
Johnson, J.; Berg, T.; Anderson, B. & Wright, B. (2022). Review of electric vehicle charger cybersecurity vulnerabilities, potential impacts, and defenses. escar USA. https://doi.org/10.5281/zenodo.18714450
Kulandaivel, S.; Jain, S.; Guajardo, J. & Sekar, V. (2022). CANdid: A stealthy stepping-stone attack to bypass authentication on ECUs. escar USA. https://doi.org/10.5281/zenodo.18714273
Henry, K.J.; Bottinelli, P. & Ebeid, N. (2017). Entropy and randomness in vehicular environments and V2X applications. escar USA. https://doi.org/10.5281/zenodo.18713891
Lapczynski, P.; Heinemann, H.; Schoneberger, T. & Metzker, D.E. (2017). Automatically generating fuzz tests from automotive communication databases. escar USA. https://doi.org/10.5281/zenodo.18714148
Wiersma, N. & Pareja, R. (2017). Safety doesn’t equal security: A security assessment of the resilience against fault injection attacks in ASIL-D certified microcontrollers. escar USA. https://doi.org/10.5281/zenodo.18714202
Berg, J.; Pommer, J.; Jin, C.; Malmin, F. & Kristensson, J. (2015). Secure gateway – A concept for an in-vehicle IP network bridging the infotainment and the safety critical domains. escar USA. https://doi.org/10.5281/zenodo.18713360