参考文章
[1] - http://www.autosec.org/pubs/cars-oakland2010.pdf
[2] - http://www.autosec.org/pubs/cars-usenixsec2011.pdf
[3] - http://illmatics.com/content.zip
[4] - http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks- with-me-behind-the-wheel-video/
[5] - http://illmatics.com/car_hacking_poories.pdf
[6] - http://illmatics.com/remote attack surfaces.pdf
[7] - http://ftp.cse.sc.edu/reports/drafts/2010-002-tpms.pdf
[8] - http://www.f-secure.com/vulnerabilities/SA201106648
[9] - http://www.ars2000.com/Codenomicon_wp_Fuzzing.pdf
[10] - https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014- 1635/
[11] - http://www.driveuconnect.com/system/2014/ramtrucks/ram_1500/8-4an-ra4/
[12] - http://www.allpar.com/corporate/tech/uconnect.html
[13] - http://forums.motortrend.com/70/8102478/the-general-forum/ferrari-california-navigation-chrysler- uconnect/index.html
[14] - https://www.techauthority.com/en-US/Pages/ItemListing.aspx?CatID=3092
[15] - http://www.allatori.com/doc.html
[16] - http://users.ece.cmu.edu/~koopman/pubs/KoopmanCRCWebinar9May2012.pdf
[17] - http://www.qnx.com/products/evaluation/eval-target.html
[18] - http://www.driveuconnect.com/software-update/
[19] - http://www.qnx.com/developers/docs/6.3.0SP3/ide_en/user_guide/builder.html
[20] - http://www.qnx.com/developers/docs/660/index.jsp?topic=%2Fcom.qnx.doc.neutrino.sys_arch%2 Ftopic%2Ffsys_ETFS.html
[21] - https://code.google.com/p/wifite/
[22] - https://www.dotsec.com/tag/wpa2/
[23] - https://en.wikipedia.org/wiki/D-Bus
[24] - https://wiki.gnome.org/Apps/DFeet
[26] - http://source.sierrawireless.com/
[27] - http://www.driveuconnect.com/features/uconnect_access/packages/
[28] - https://en.wikipedia.org/wiki/Long-range_Wi-Fi
[29] - https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF- 8#q=femtocell%20hacking
[30] - http://www.sprint.com/landings/airave/#!/
[31] - http://files.persona.cc/zefie/files/airvana/telnet.html
[32] - http://www.busybox.net/
[33] -http://documentation.renesas.com/doc/products/mpumcu/doc/v850/R01UH0237ED0320_V850ES Fx3.pdf
[34] - https://www.iar.com/iar-embedded-workbench/
[35] - http://www.consumerreports.org/cro/news/2015/05/keeping-your-car-safe-from-hacking/index.htm
[36] - https://en.wikipedia.org/wiki/Mark_and_recapture
[37] - http://www.reuters.com/article/2015/01/06/us-fiat-chrysler-jeep-idUSKBN0KF1BW20150106
[38] - http://www.chevrolet.com/onstar-remotelink.html
[40] - https://www2.onstar.com/web/portal/securityexplore?tab=1&g=1
[41] - https://en.wikibooks.org/wiki/Cryptography/Brute_force_attack
[42] - http://www.techrepublic.com/blog/it-security/the-danger-of-complexity-more-code-more-bugs/).
[43] - http://www.devtopics.com/100-million-lines-of-code-in-your-car/
Last updated