[1] 宋城. 国家发改委等联合印发《汽车产业中长期发展规划》[J]. 中国设备工程, 2017(9):1. (SONG C. The National Development and Reform Commission and others jointly issued the Medium and Long-Term Development Plan for the Automotive Industry[J]. China Plant Engineering,2017(9):1.) [2] 张岩. 车联网时代防止黑客把汽车变成大杀器一次震惊汽车界的黑客"挟持"[J]. 环境与生活,2015(10):34-37. (ZHANG Y. In the age of Internet of vehicles,preventing hackers from turning cars into big killers,a hacker who shocked the automobile industry "holding"[J]. Green Living,2015(10):34-37.) [3] MÜTER M,ASAJ N. Entropy-based anomaly detection for invehicle networks[C]//Proceedings of the 2011 IEEE Intelligent Vehicles Symposium. Piscataway:IEEE,2011:1110-1115. [4] HOPPE T,KILTZ S,DITTMANN J. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures[J]. Reliability Engineering and System Safety, 2011,96(1):11-25. [5] NILSSON D K,LARSON U E,JONSSON E. Efficient in-vehicle delayed data authentication based oncompound message authentication codes[C]//Proceedings of the IEEE 68th Vehicular Technology Conference. Piscataway:IEEE,2008:1-5. [6] MURVAY P S,GROZA B. DoS attacks on controller area networks by fault injections from the software layer[C]//Proceedings of the 12th International Conference on Availability, Reliability and Security. New York:ACM,2017:No. 71. [7] CHO K T,SHIN K G. Error handling of in-vehicle networks makes them vulnerable[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2016:1044-1055. [8] SOUMA D,MORI A,YAMAMOTO H,HATA Y. Counter attacks for bus-off attacks[C]//Proceedings of the 37th International Conference on Computer Safety,Reliability,and Security. Cham:Springer,2018:319-330. [9] LEE H,JEONG S H,KIM H K. OTIDS:a novel intrusion detection system for in-vehicle network by using remote frame[C]//Proceedings of the 15th Annual Conference on Privacy,Security and Trust. Piscataway:IEEE,2018:57-66. [10] MILLER C,VALASEK C. Adventures in automotive networks and control units[EB/OL].[2019-06-08]. http://illmatics.com/car_hacking.pdf. [11] MILLER C,VALASEK C. Remote exploitation of an unaltered passenger vehicle[EB/OL].[2019-05-04]. http://cis.temple.edu/~qzeng/cis4360-spring17/papers/Remote-Car-Hacking.pdf. [12] IEHIRA K,INOUE H,ISHIDA K. Spoofing attack using bus-off attacks against a specific ECU of the CAN bus[C]//Proceedings of the 15th IEEE Annual Consumer Communications and Networking Conference. Piscataway:IEEE,2018:1-4. [13] PALANCA A,EVENCHICK E,MAGGI F,et al. A stealth, selective,link-layer denial-of-service attack against automotive networks[C]//Proceedings of the 2017 International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,LNCS 10327. Cham:Springer,2017:185-206. [14] TRAN E. Multi-bit error vulnerabilities in the controller area network protocol[EB/OL].[2019-06-15]. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=575EECA81C4A045BCAFDEBF41C663367?doi=10.1.1.39.982&rep=rep1&type=pdf. [15] 关亚东. 车内CAN总线入侵检测算法研究[D]. 哈尔滨:哈尔滨工业大学,2019:47-55.(GUAN Y D. Research on in-vehicle CAN bus intrusion detection algorithm[D]. Harbin:Harbin Institute of Technology,2019:47-55.) |