Seite 1, Druckdatum: 13.11.2018, 14:57 Uhr
Links & Literatur
[1] Margi Murphy; Computerworld UK: „Home Office to work with car manufacturers to defend against hackers“
[2] Chris Greenwood; Daily Mail: „Hackers are blamed for a third of car thefts: One in three vehicles stolen by high-tech criminals who do not need owner's keys“
[3] ConsumerReports.org: „Hacking car security 12/05: Keyless entry system, car security system“ (via Archive.org)
[4] Steve Bono, Matthew Green, Adam Stubblefield, Avi Rubin, Ari Juels, Michael Szydlo: „Analysis of the Texas Instruments DST RFID“ (via archive.org)
[5] Lestlane News: „Gone in 20 Minutes: using laptops to steal cars“ (via archive.org)
[6] Slashdot: „Using Laptops to Steal Cars“
[7] Bruce Schneier; Schneier on Security: „Stealing Cars with Laptops“
[8] Josh Robertson; The Courier-Mail: „$30 device available online blamed for spike in car thefts in Queensland“
[9] Nitesh Dhanjani: „Cursory Evaluation of the Tesla Model S: We Can't Protect Our Cars Like We Protect Our Workstations“
[10] Graham Cluley: „How a hacked password can unlock a Tesla car“
[11] Rob Waugh; ESET We Live Security: „Tesla shocker as researcher picks electric supercar’s lock“
[12] Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage; IEEE Symposium on Security and Privacy 2010: „Experimental Security Analysis of a Modern Automobile“
[13] Alberto Garcia Illera, Javier Vazquez Vidal; Black Hat Asia 2014: „Dude, WTF in My CAN!“
[14] Charlie Miller, Chris Valasek; DefCon 21 (2013): „Adventures in Automotive Networks and Control Units“
[15] Chris Valasek, Charlie Miller; IOActive Labs Research Blog: „Car Hacking: The Content“
[16] Andy Greenberg; Forbes: „Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (Video)“
[17] Charlie Miller, Chris Valasek; SyScan Singapore 2014: „Car Hacking for Poories“
[18] Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno; USENIX Security 2011: „Comprehensive Experimental Analyses of Automotive Attack Surfaces“
[19] Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar: „Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study“
[20] Bruce Schneier; Schneier on Security: „Hacking Cars Through Wireless Tire-Pressure Sensors“
[21] Charlie Miller, Christopher Valasek; Black Hat USA 2014: „A Survey of Remote Automotive Attack Surfaces“
[22]Brian Donohue; Kaspersky Lab Blog: „Mobiles Auto-Hacking auf der Black Hat“
[23] Michael Mimoso; ThreatPost: „Car Hacking Enters Remote Exploitation Phase“
[24] Chris Valasek; IOActive Labs Research Blog: „Remote survey paper (car hacking)“
[25] Andy Greenberg; Wired: „Hackers Could Take Control of Your Car. This Device Can Stop Them“
[26] Wayne Yan, Kai Peng; SyScan360: „Hack Your Car and I’ll Drive You Crazy: the Design of Hack-proof CAN-based Automotive System“
[27] Lisa Vaas; Sophos Naked Security: „$80 million yacht hijacked by students spoofing GPS signals“
[28] Cockrell School of Engineering: „UT Austin Researchers Spoof Superyacht at Sea“
[29] Marco Balduzzi, Kyle Wihoit, Alessandro Pasta; Hack in the Box Malaysia 2013: „Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit“
[30] Marco Balduzzi, Kyle Wihoit, Alessandro Pasta: „Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit“
[31] Marco Balduzzi; Black Hat Asia 2014: „AIS Exposed Understanding Vulnerabilities & Attacks 2.0“
[32] Marco Balduzzi, Alessandro Pasta; Hack in the Box Amsterdam 2014: „AIS Exposed: New Vulnerabilities and Attacks“
[33] Hugo Teso; Hack in the Box Amsterdam 2013: „Aircraft Hacking: Practical Aero Series“
[34] Zeljka Zorz, Berislav Kucan; Help Net Security: „Hijacking airplanes with an Android phone“
[35] Andy Greenberg; Forbes: „Researcher Says He's Found Hackable Flaws In Airplanes' Navigation Systems (Update: The FAA Disagrees)“
[36] Zeljka Zorz; Help Net Security: „FAA and EASA say hijacking planes using an app is not possible“
[37] Hugo Teso; Hack in the Box Malaysia 2013: „Digging Deeper into Aviation Security“
[38] Hugo Teso; n.runs Blog: „Aviation Security - FMS Exploitation Over ACARS“
[39] Brad "RenderMan" Haines; DefCon 20 (2012): „Hacker + Airplanes = No Good Can Come Of This“
[40] Lisa Vaas: Sophos Naked Security: „Drone hijacked by hackers from Texas college with $1,000 spoofer“
[41] Ruben Santamarta; Black Hat USA 2014: „SATCOM Terminals: Hacking by Air, Sea, and Land“
[42] Ruben Santamarta; IOActive Labs Blog: „A Wake-up Call for SATCOM Security“
[43] Jim Finkle; Reuters: „Hacker says to show passenger jets at risk of cyber attack“
[44] Dr. Phil Polstra, Captain PollyKadolph; DefCon 22 (2014): „Cyberhijacking Airplanes: Truth or Fiction?“
[45] DefCon 22 Presentation Phil Polstra
[46] Dr. Phil Polstra: „Cyberhijacking Airplanes: Truth or fiction“