1. Remote exploitation of an unaltered passenger vehicle;Charlie,2015
2. 0-days mitigations: Roadways to exploit and secure connected bmw cars;Zhiqiang,2016
3. Free-fall: Hacking Tesla from wireless to CAN bus;Sen,2016
4. Tesla vehicles can be stolen with new relay attack, but there’s a two-inch caveat;Lambert,2022
5. Automotive Ethernet