Footnotes - The Car Hacker's Handbook: A Guide for the Penetration Tester - Craig Smith

The Car Hacker's Handbook: A Guide for the Penetration Tester - Craig Smith (2016)

Footnotes

Chapter 10: Vehicle-to-Vehicle Communication

1. James Misener et al., Communications Data Delivery System Analysis: Task 2 Report: High-Level Options for Secure Communications Data Delivery Systems (Intelligent Transportation System Joint Program Office, May 16, 2012), http://ntl.bts.gov/lib/45000/45600/45615/FHWA-JPO-12-061_CDDS_Task_2_Rpt_FINAL.pdf

Chapter 12: Attacking Wireless Systems with SDR

1. Ishtiaq Rouf et al., “Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” USENIX Security ’10, Proceedings of the 19th USENIX Conference on Security, August 2010: 323-338, https://www.usenix.org/legacy/events/sec10/tech/full_papers/Rouf.pdf.

2. Samy Kamkar, “Drive It Like You Hacked It” (presentation, DEF CON 23, Las Vegas, NV, August 6 2015), http://samy.pl/defcon2015/2015-defcon.pdf.

3. Jos Wetzels, “Broken Keys to the Kingdom: Security and Privacy Aspects of RFID-Based Car Keys,” eprint arXiv:1405.7424 (May 2014), http://arxiv.org/ftp/arxiv/papers/1405/1405.7424.pdf.

4. Aurélien Francillon, Boris Danev, and Srdjan Capkun, “Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars,” NDSS 2011 (February 2011) https://eprint.iacr.org/2010/332.pdf.

5. Roel Verdult, Flavio D. Garcia, and Barış Ege, “Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer,” Supplement to the Proceedings of the 22nd USENIX Security Symposium, August 2013: 703-718, https://www.usenix.org/sites/default/files/sec15_supplement.pdf.

6. Volkswagen Aktiengesellschaft v. Garcia & Ors [2013] E.W.H.C. 1832 (Ch.).

7. Roel Verdult, Flavio D. Garcia, and Josep Balasch, “Gone in 360 Seconds: Hijacking with Hitag2,” USENIX Security ’12, Proceedings of the 21st USENIX Conference on Security, August 2012: 237-268, https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final95.pdf.

8. Stephen C. Bono et al., “Security Analysis of a Cryptographically-Enabled RFID Device,” 14th USENIX Security Symposium, August 2005, http://usenix.org/legacy/events/sec05/tech/bono/bono.pdf.