1. (1) K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway et al., Experimental security analysis of a modern automobile, 2010 IEEE Symposium on Security and Privacy, pages 447–462, 2010.
2. (2) S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage et al., Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the 20th USENIX Conference on Security, SEC’11, page 6, USA, 2011. USENIX Association.
3. (3) C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, 2015.
4. (4) K.-T. Cho and K. G. Shin, Fingerprinting electronic control units for vehicle intrusion detection, Proceedings of the 25th USENIX Conference on Security Symposium, SEC’16, page 911–927, USA, 2016. USENIX Association.
5. (5) S. U. Sagong, X. Ying, A. Clark, L. Bushnell, and R. Poovendran, Cloaking the clock: Emulating clock skew in controller area networks, 2018 ACM/IEEE 9th International Conference on CyberPhysical Systems (ICCPS), pages 32–42, 2018.