1,226
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A System to Recognize Intruders in Controller Area Network (CAN)

      Published
      proceedings-article
      , , , ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
      17 - 18 September 2015
      controller area network (CAN), automotive security, security mechanism, network security
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 111-114
            Affiliations
            [0001]University of South Alabama
            Article
            10.14236/ewic/ICS2015.15
            8e1ae79f-9282-4616-ab0d-46a06164f1c6
            © Carsten et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2015.15
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            controller area network (CAN),automotive security,security mechanism,network security

            References

            1. 2011 Comprehensive experimental analyses of automotive attack surfaces USENIX Security Symposium

            2. 2012 CAN with flexible data-rate 13th International CAN Conference (iCC2012) Hambach, Germany

            3. 2008 Security threats to automotive CAN networks– practical examples and selected short-term countermeasures Computer Safety, Reliability, and Security Berlin Heidelberg, Germany Springer 235 248

            4. 2010 Experimental security analysis of a modern automobile IEEE Symposium Security and Privacy (SP)

            5. 2011 Security aspects of the in-vehicle network in the connected car IEEE Intelligent Vehicles Symposium (IV)

            6. 2008 Securing vehicles against cyber attacks Proceedings of the 4th Intelligence Research: Developing Strategies Annual Workshop on Cyber Security and Information to Meet the Cyber Security and Information Intelligence Challenges Ahead ACM

            7. 2013 Adventures in automotive networks and control units Available from http://illmatics. com/car_hacking.pdf

            8. 2014 Your car is a giant computer-and it can be hacked CNN Money. http://money.cnn.com/2014/06/01/technology/se curity/car-hack/index.html?hpt=hp_t1 Accessed 2 June

            9. 2010 A model for safe and secure execution of downloaded vehicle applications IET Road Transport Information and Control Conference and the ITS United Kingdom Members’ Conference

            10. SLOA101A 2008 Introduction to the controller area network (CAN) Texas Instruments Dallas, TX

            11. 2004 Security in automotive bus systems Workshop on Embedded IT-Security in Cars Bochum, Germany

            Comments

            Comment on this article