@inproceedings{garip_congestion_2015, title = {Congestion {Attacks} to {Autonomous} {Cars} {Using} {Vehicular} {Botnets}}, isbn = {1-891562-39-8}, url = {http://www.internetsociety.org/doc/congestion-attacks-autonomous-cars-using-vehicular-botnets}, doi = {10.14722/sent.2015.23001}, language = {en}, urldate = {2015-04-14}, publisher = {Internet Society}, author = {Garip, Mevlut Turker and Gursoy, Mehmet Emre and Reiher, Peter and Gerla, Mario}, year = {2015} } @article{hiertz_ieee_2010, title = {The {IEEE} 802.11 universe}, volume = {48}, issn = {0163-6804}, url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5394032}, doi = {10.1109/MCOM.2010.5394032}, number = {1}, urldate = {2015-04-14}, journal = {IEEE Communications Magazine}, author = {Hiertz, Guido and Denteneer, Dee and Stibor, Lothar and Zang, Yunpeng and Costa, Xavier and Walke, Bernhard}, month = jan, year = {2010}, pages = {62--70} } @article{fox-brewster_hacker_2015, title = {Hacker {Says} {Attacks} {On} '{Insecure}' {Progressive} {Insurance} {Dongle} {In} 2 {Million} {US} {Cars} {Could} {Spawn} {Road} {Carnage}}, url = {http://www.forbes.com/sites/thomasbrewster/2015/01/15/researcher-says-progressive-insurance-dongle-totally-insecure/}, journal = {Forbes}, author = {Fox-Brewster, Thomas}, month = jan, year = {2015} } @misc{ofir_remote_2014, title = {A remote attack on an aftermarket telematics service}, url = {http://argus-sec.com/blog/remote-attack-aftermarket-telematics-service/}, urldate = {2015-04-14}, journal = {Argus Cyber Security Blog}, author = {Ofir, Ron and Kapota, Ofer}, year = {2014} } @article{fox-brewster_zubie:_2014, title = {Zubie: {This} {Car} {Safety} {Tool} '{Could} {Have} {Given} {Hackers} {Control} {Of} {Your} {Vehicle}'}, url = {http://www.forbes.com/sites/thomasbrewster/2014/11/07/car-safety-tool-could-have-given-hackers-control-of-your-vehicle/2/}, journal = {Forbes}, author = {Fox-Brewster, Thomas}, month = nov, year = {2014} } @techreport{klimke_benefits_2014, title = {Benefits and {Values} of the {Trusted} {Platform} {Module} in the automotive industry}, institution = {Infineon Technologies}, author = {Klimke, Martin}, year = {2014} } @inproceedings{bin_key_2013, series = {8}, title = {Key {Agreement} {Algorithms} for {Vehicular} {Communication} {Networks} {Based} on {Reciprocity} and {Diversity} {Theorems}}, volume = {62}, booktitle = {{IEEE} {TRANSACTIONS} {ON} {VEHICULAR} {TECHNOLOGY}}, author = {Bin, Z. and Marco, G. and Fei, H.}, year = {2013} } @inproceedings{lotfi_towards_2013, title = {Towards {Extended} {Safety} in {Connected} {Vehicles}}, booktitle = {{IEEE} {Annual} {Conference} on {Intelligent} {Transportation} {Systems}}, author = {Lotfi, O. and Ala, A. and Elyes, H. and Mark, B.}, year = {2013} } @techreport{kyusuk_practical_2014, title = {Practical {Real}-{Time} {Frame} {Authentication} for {In}-{Vehicle} {Networks}}, institution = {University of Michigan}, author = {Kyusuk, H. and Swapna, P. and Kang, S. and Andre, W.}, year = {2014} } @techreport{hideaki_approaches_2013, title = {Approaches for {Vehicle} {Information} {Security}}, institution = {INFORMATION-TECHNOLOGY PROMOTION AGENCY}, author = {Hideaki, K. and Chisato, K. and Makoto, K. and Manabu, N.}, month = aug, year = {2013} } @techreport{cronin_vehicle_2014, title = {Vehicle-to-{Infrastructure} ({V}2I) {Communications} for {Safety}}, url = {http://www.its.dot.gov/research/v2i.htm}, institution = {ITS Joint Program Office}, author = {Cronin, Brian}, month = aug, year = {2014} } @misc{backup_stats, title = {Lives Shattered in Backup Accidents}, url = {http://www.cse.msu.edu/~cse870/Homework/References/Lives-shattered-backup-accidents.pdf}, institution = {Associated Press}, author = {AP}, years = {2007}, month = jun, day = {24} }