Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting
Due to the vulnerability of in-vehicle networks, particularly the Controller Area Network
(CAN), malicious remote intrusion into vehicles has been a prominent public concern in …
(CAN), malicious remote intrusion into vehicles has been a prominent public concern in …
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks
Z Liu, C Hu, C Shan, Z Peng - Information Sciences, 2023 - Elsevier
The existing researches point to a lack of studies addressing the quantitative evaluation of
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …
Analysis and prevention of mcas-induced crashes
NT Curran, TW Kennings… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Semi-autonomous (SA) systems face the C hallenge of determining which source to
prioritize for control, whether it is from the human operator or the autonomous controller …
prioritize for control, whether it is from the human operator or the autonomous controller …
DGIDS: Dynamic graph-based intrusion detection system for CAN
J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Abstract The Controller Area Network (CAN) is widely used in automobiles to interconnect
safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent …
safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent …
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN
J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Due to the absence of encryption and authentication mechanisms in the Controller Area
Network (CAN), it is highly susceptible to attacks, especially with the increasing connectivity …
Network (CAN), it is highly susceptible to attacks, especially with the increasing connectivity …
An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …
transportation on a global scale. Such innovations for transportation can bring manyfold …
Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE
Automotive softwarization is progressing and future cars are expected to operate a Service-
Oriented Architecture on multipurpose compute units, which are interconnected via a high …
Oriented Architecture on multipurpose compute units, which are interconnected via a high …
A Survey of Security Mechanisms for Edge Computing based Connected Autonomous Vehicles
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …
transportation on a global scale. Such innovations for transportation can bring manyfold …
A context-aware on-board intrusion detection system for smart vehicles
Modern vehicles are becoming more appealing to potential intruders due to two primary
reasons. Firstly, they are now equipped with various connectivity features like WiFi …
reasons. Firstly, they are now equipped with various connectivity features like WiFi …
Context-Aware Anomaly Detection Using Vehicle Dynamics
CY Chen, KG Shin, S Dadras - … of the 27th International Symposium on …, 2024 - dl.acm.org
Replacing traditional vehicular components with electronic components brings numerous
benefits but also introduces new vulnerabilities. To cope with this double-edged trend, we …
benefits but also introduces new vulnerabilities. To cope with this double-edged trend, we …