References
- Alexander K., Daniel A., Herve S., Tyrone S. and Marko W.(2013), "Trust assurance levels of cybercars in v2x communication," 2013 ACM workshop on Security, privacy & dependability for cyber vehicles, pp.49-60.
- Charlie M. and Chris V.(2015), Remote exploitation of an unaltered passenger vehicle, Black Hat USA 2015.
- Common Vulnerabilities and Exposures, "CVE-2017-6054," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6054, accedded 2019.03.29.
- Common Vulnerabilities and Exposures, "CVE-2018-1170," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1170, accessed 2019.03.29, 2019e
- Common Vulnerabilities and Exposures, "CVE-2018-16806," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16806, accessed 2019.03.29, 2019d
- Common Vulnerabilities and Exposures, "CVE-2018-18071," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18071, accessed 2019.03.29, 2019c
- Common Vulnerabilities and Exposures, "CVE-2018-18203," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18203, accessed 2019.03.29, 2019b
- Common Vulnerabilities and Exposures, "CVE-2018-9322," https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-9322, accessed 2019.03.29, 2019a
- Conde Nast, https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/, 2019. 03. 29.
- for Information Technology Security Evaluation - Evaluation methodology, https://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R5.pdf.
- Hiro O.(2012), "Paradigm change of vehicle cyber security," 2012 4th International Conference on Cyber Conflict(CYCON 2012), pp.1-11.
- ISO, ISO/SAE CD 21434 Road Vehicles - Cybersecurity engineering, https://www.iso.org/standard/70918.html", accessed 2019.04.26.
- ISO/IEC 15408(2017), Common Methodology
- Karl K., Alexei C., Franziska R., Shwetak P., Tadayos K., Stephen C., Damon M., Brian K., Danny A., Hovav S and Stefan S, (2010), "Experimental Security Analysis of a Modern Automobile," 2010 IEEE Symposium on Security and Privacy, pp.447-462.
- Marko W. and Michael S.(2009), A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems, Automotive-Safety Security 2012, pp.195-210.
- Marko W.(2018), "Strategies against being taken hostage by ransomware," ATZelektronik worldwide, vol. 13, no. 2, pp.44-47. https://doi.org/10.1007/s38314-018-0011-3
- Pen Test Partners LLP, https://www.pentestpartners.com/security-blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv, 2019. 03. 29.
- PricewaterhouseCoopers(PwC) GmbH(2017), The 2017 Strategy & Digital Auto Report, https://www.strategyand.pwc.com/media/file/2017-Strategyand-Digital-Auto-Report.pdf.
- PricewaterhouseCoopers(PwC) GmbH(2018), Five trends transforming the Automotive Industry, https://www.pwc.at/de/publikationen/branchen-und-wirtschaftsstudien/eascy-five-trends-transforming-the-automotive-industry_2018.pdf.
-
SAE International(2018),
$J3016^{TM}$ Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles, https://saemobilus.sae.org/content/J3016_201806. - Sen N., Ling L. and Yuefeng D.(2017), Free-Fall: Hacking Tesla From Wireless to Can Bus, Black Hat USA 2017.
- Tencent Keen Security Lab, https://keenlab.tencent.com/en/2018/05/22/New-CarHacking-Research-by-KeenLab-Experimental-Security-Assessment-of-BMW-Cars/, 2019.03.31.
- US DoT(2017), An Introduction to Connected Automated Vehicles, https://www.its.dot.gov/presentations/2017/CAV2017_AdvTechTransport.pdf.
- Yousik L., Samuel W., Jungho L., Yunkeun S., Heeseok M. and Donghoon L.(2019), "Enhanced Android App-Repackaging Attack on In-Vehicle Network," Wireless Communications and Mobile Computing, vol. 2019, no. 5650245, p.13.