1. [1] Koscher, K., Czeskis A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H. and Savage, S.: Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy (SP), IEEE Computer Society, pp.447-462 (2010).
2. [2] Hoppe, T., Kiltz, S. and Dittmann, J.: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures, International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2008), LNCS 5219, pp.235-248 (2008).
3. [3] Wolf, M., Weimerskirch, A. and Paar, C.: Secure In-Vehicle Communication, Embedded Security in Cars, Lemke, K., Paar, C. and Wolf, M. (Eds.), pp.95-109, Springer-Verlag Berlin Heidelberg (2006), ISBN-10 3-540-28384-6 (Print).
4. [4] Valasek, C. and Miller, C.: Adventures in Automotive Networks and Control Units, Technical White Paper, IOActive (2014).
5. [5] Hoppe, T., Kiltz, S. and Dittmann, J.: Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats, International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2009), LNCS 5775, pp.145-158 (2009).