Hacking Connected Cars最新文献

筛选
英文 中文
Risk‐Assessment Frameworks 风险优先评估框架
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch8
{"title":"Risk‐Assessment Frameworks","authors":"","doi":"10.1002/9781119491774.ch8","DOIUrl":"https://doi.org/10.1002/9781119491774.ch8","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pre‐Engagement 提前接触
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch1
{"title":"Pre‐Engagement","authors":"","doi":"10.1002/9781119491774.ch1","DOIUrl":"https://doi.org/10.1002/9781119491774.ch1","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploitation 剥削
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch5
{"title":"Exploitation","authors":"","doi":"10.1002/9781119491774.ch5","DOIUrl":"https://doi.org/10.1002/9781119491774.ch5","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131195073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post Exploitation 后开发
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch6
{"title":"Post Exploitation","authors":"","doi":"10.1002/9781119491774.ch6","DOIUrl":"https://doi.org/10.1002/9781119491774.ch6","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123156590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Analysis 脆弱性分析
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch4
{"title":"Vulnerability Analysis","authors":"","doi":"10.1002/9781119491774.ch4","DOIUrl":"https://doi.org/10.1002/9781119491774.ch4","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligence Gathering 情报收集
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch2
Vic Vandal
{"title":"Intelligence Gathering","authors":"Vic Vandal","doi":"10.1002/9781119491774.ch2","DOIUrl":"https://doi.org/10.1002/9781119491774.ch2","url":null,"abstract":"We must recognize that \"documentation\" and \"evidence\" often mean nothing in this age. Remember the doctored video which the Feds and media used to demonize David Koresh at Waco? Koresh had been accused of getting a 70 year old woman pregnant, so sarcastically he joked, \"If I can impregnate a 70 year old woman, then I guess I am God.\" the media played the last three words, \"I am God,\" endlessly to demonize him. Then, also, of course, they employed their favorite tactic, accusing him of sexual impropriety with young girls. And that, too, turned out to be false propaganda. Not that I am defending Mr. Koresh for his religious views, which were multi-racial and universalist, but the points are as follows:","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PKI in Automotive 汽车领域的PKI
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.ch9
{"title":"PKI\u0000 in Automotive","authors":"","doi":"10.1002/9781119491774.ch9","DOIUrl":"https://doi.org/10.1002/9781119491774.ch9","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
Hacking Connected Cars Pub Date : 2020-03-10 DOI: 10.1002/9781119491774.index
{"title":"Index","authors":"","doi":"10.1002/9781119491774.index","DOIUrl":"https://doi.org/10.1002/9781119491774.index","url":null,"abstract":"","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Modeling 威胁建模
Hacking Connected Cars Pub Date : 2018-12-17 DOI: 10.1201/9780429506475-12
James Helfrich
{"title":"Threat Modeling","authors":"James Helfrich","doi":"10.1201/9780429506475-12","DOIUrl":"https://doi.org/10.1201/9780429506475-12","url":null,"abstract":"Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system. 1. Some Common Definition (RFC 2828) Vulnerability: \" A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy \" Threat: \" A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm... a threat is a possible danger that might exploit a vulnerability \" Attack: \" An assault on system security that derives from an intelligent threat, to evade security services and violate the security policy of a system. \" 2. Modeling Phases We are currently following an iterative step, starting from the higher level – identifying major components and identification of threats from overall perspective. In the second part, we are performing threat analysis for each of the earlier identified components then passing data through those components from identified major use case. Finally, we merge the analysis report to one. Questions: component breakdown or use case breakdown is better option ? Figure 1: An iterative process for threat identification","PeriodicalId":253087,"journal":{"name":"Hacking Connected Cars","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 316
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信