共 24 条
[2]
[Anonymous], Wikipedia
[3]
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[4]
Viden: Attacker Identification on In-Vehicle Networks
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1109-1123
[5]
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[7]
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1497-1511
[9]
Advanced Persistent Threats in Autonomous Driving
[J].
Performance Evaluation Review,
2020, 47 (04)
:25-28
[10]
Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:787-800