参考文章

[1] - http://www.autosec.org/pubs/cars-oakland2010.pdfarrow-up-right

[2] - http://www.autosec.org/pubs/cars-usenixsec2011.pdfarrow-up-right

[3] - http://illmatics.com/content.ziparrow-up-right

[4] - http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-arrow-up-right with-me-behind-the-wheel-video/

[5] - http://illmatics.com/car_hacking_poories.pdfarrow-up-right

[6] - http://illmatics.com/remote attack surfaces.pdfarrow-up-right

[7] - http://ftp.cse.sc.edu/reports/drafts/2010-002-tpms.pdfarrow-up-right

[8] - http://www.f-secure.com/vulnerabilities/SA201106648arrow-up-right

[9] - http://www.ars2000.com/Codenomicon_wp_Fuzzing.pdfarrow-up-right

[10] - https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-arrow-up-right 1635/

[11] - http://www.driveuconnect.com/system/2014/ramtrucks/ram_1500/8-4an-ra4/arrow-up-right

[12] - http://www.allpar.com/corporate/tech/uconnect.htmlarrow-up-right

[13] - http://forums.motortrend.com/70/8102478/the-general-forum/ferrari-california-navigation-chrysler-arrow-up-right uconnect/index.html

[14] - https://www.techauthority.com/en-US/Pages/ItemListing.aspx?CatID=3092arrow-up-right

[15] - http://www.allatori.com/doc.htmlarrow-up-right

[16] - http://users.ece.cmu.edu/~koopman/pubs/KoopmanCRCWebinar9May2012.pdfarrow-up-right

[17] - http://www.qnx.com/products/evaluation/eval-target.htmlarrow-up-right

[18] - http://www.driveuconnect.com/software-update/arrow-up-right

[19] - http://www.qnx.com/developers/docs/6.3.0SP3/ide_en/user_guide/builder.htmlarrow-up-right

[20] - http://www.qnx.com/developers/docs/660/index.jsp?topic=%2Fcom.qnx.doc.neutrino.sys_arch%2arrow-up-right Ftopic%2Ffsys_ETFS.html

[21] - https://code.google.com/p/wifite/arrow-up-right

[22] - https://www.dotsec.com/tag/wpa2/arrow-up-right

[23] - https://en.wikipedia.org/wiki/D-Busarrow-up-right

[24] - https://wiki.gnome.org/Apps/DFeetarrow-up-right

[25] - http://newsroom.sprint.com/news-releases/sprint-velocity-offers-automakers-customizable-approach-to-enhancing-new-and-existing-telematics-and-in-vehicle-communications-systems.htmarrow-up-right

[26] - http://source.sierrawireless.com/arrow-up-right

[27] - http://www.driveuconnect.com/features/uconnect_access/packages/arrow-up-right

[28] - https://en.wikipedia.org/wiki/Long-range_Wi-Fiarrow-up-right

[29] - https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-arrow-up-right 8#q=femtocell%20hacking

[30] - http://www.sprint.com/landings/airave/#!/arrow-up-right

[31] - http://files.persona.cc/zefie/files/airvana/telnet.htmlarrow-up-right

[32] - http://www.busybox.net/arrow-up-right

[33] -http://documentation.renesas.com/doc/products/mpumcu/doc/v850/R01UH0237ED0320_V850ESarrow-up-right Fx3.pdf

[34] - https://www.iar.com/iar-embedded-workbench/arrow-up-right

[35] - http://www.consumerreports.org/cro/news/2015/05/keeping-your-car-safe-from-hacking/index.htmarrow-up-right

[36] - https://en.wikipedia.org/wiki/Mark_and_recapturearrow-up-right

[37] - http://www.reuters.com/article/2015/01/06/us-fiat-chrysler-jeep-idUSKBN0KF1BW20150106arrow-up-right

[38] - http://www.chevrolet.com/onstar-remotelink.htmlarrow-up-right

[39] - http://www.theblaze.com/stories/2012/07/18/cant-just-shut-it-off-anywhere-onstar-stops-stolencamaro-during-police-chase/arrow-up-right

[40] - https://www2.onstar.com/web/portal/securityexplore?tab=1&g=1arrow-up-right

[41] - https://en.wikibooks.org/wiki/Cryptography/Brute_force_attackarrow-up-right

[42] - http://www.techrepublic.com/blog/it-security/the-danger-of-complexity-more-code-more-bugs/arrow-up-right).

[43] - http://www.devtopics.com/100-million-lines-of-code-in-your-car/arrow-up-right

Last updated