参考文章

[1] - http://www.autosec.org/pubs/cars-oakland2010.pdf

[2] - http://www.autosec.org/pubs/cars-usenixsec2011.pdf

[3] - http://illmatics.com/content.zip

[4] - http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks- with-me-behind-the-wheel-video/

[5] - http://illmatics.com/car_hacking_poories.pdf

[6] - http://illmatics.com/remote attack surfaces.pdf

[7] - http://ftp.cse.sc.edu/reports/drafts/2010-002-tpms.pdf

[8] - http://www.f-secure.com/vulnerabilities/SA201106648

[9] - http://www.ars2000.com/Codenomicon_wp_Fuzzing.pdf

[10] - https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014- 1635/

[11] - http://www.driveuconnect.com/system/2014/ramtrucks/ram_1500/8-4an-ra4/

[12] - http://www.allpar.com/corporate/tech/uconnect.html

[13] - http://forums.motortrend.com/70/8102478/the-general-forum/ferrari-california-navigation-chrysler- uconnect/index.html

[14] - https://www.techauthority.com/en-US/Pages/ItemListing.aspx?CatID=3092

[15] - http://www.allatori.com/doc.html

[16] - http://users.ece.cmu.edu/~koopman/pubs/KoopmanCRCWebinar9May2012.pdf

[17] - http://www.qnx.com/products/evaluation/eval-target.html

[18] - http://www.driveuconnect.com/software-update/

[19] - http://www.qnx.com/developers/docs/6.3.0SP3/ide_en/user_guide/builder.html

[20] - http://www.qnx.com/developers/docs/660/index.jsp?topic=%2Fcom.qnx.doc.neutrino.sys_arch%2 Ftopic%2Ffsys_ETFS.html

[21] - https://code.google.com/p/wifite/

[22] - https://www.dotsec.com/tag/wpa2/

[23] - https://en.wikipedia.org/wiki/D-Bus

[24] - https://wiki.gnome.org/Apps/DFeet

[25] - http://newsroom.sprint.com/news-releases/sprint-velocity-offers-automakers-customizable-approach-to-enhancing-new-and-existing-telematics-and-in-vehicle-communications-systems.htm

[26] - http://source.sierrawireless.com/

[27] - http://www.driveuconnect.com/features/uconnect_access/packages/

[28] - https://en.wikipedia.org/wiki/Long-range_Wi-Fi

[29] - https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF- 8#q=femtocell%20hacking

[30] - http://www.sprint.com/landings/airave/#!/

[31] - http://files.persona.cc/zefie/files/airvana/telnet.html

[32] - http://www.busybox.net/

[33] -http://documentation.renesas.com/doc/products/mpumcu/doc/v850/R01UH0237ED0320_V850ES Fx3.pdf

[34] - https://www.iar.com/iar-embedded-workbench/

[35] - http://www.consumerreports.org/cro/news/2015/05/keeping-your-car-safe-from-hacking/index.htm

[36] - https://en.wikipedia.org/wiki/Mark_and_recapture

[37] - http://www.reuters.com/article/2015/01/06/us-fiat-chrysler-jeep-idUSKBN0KF1BW20150106

[38] - http://www.chevrolet.com/onstar-remotelink.html

[39] - http://www.theblaze.com/stories/2012/07/18/cant-just-shut-it-off-anywhere-onstar-stops-stolencamaro-during-police-chase/

[40] - https://www2.onstar.com/web/portal/securityexplore?tab=1&g=1

[41] - https://en.wikibooks.org/wiki/Cryptography/Brute_force_attack

[42] - http://www.techrepublic.com/blog/it-security/the-danger-of-complexity-more-code-more-bugs/).

[43] - http://www.devtopics.com/100-million-lines-of-code-in-your-car/

Last updated