2012
DOI: 10.1007/978-3-642-33678-2_11
|View full text |Cite
|
Sign up to set email alerts
|

IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The algorithm executes in an automated manner and saves time compared to other manual approaches. Further, they consider a hit-and-run accident as stated by Hoppe et al [88], where some suspects without alibi claim their innocence. A route reconstruction within proximity to the incident area is suggested for the involved vehicles to absolve innocent suspects.…”
Section: B Categorization Of Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm executes in an automated manner and saves time compared to other manual approaches. Further, they consider a hit-and-run accident as stated by Hoppe et al [88], where some suspects without alibi claim their innocence. A route reconstruction within proximity to the incident area is suggested for the involved vehicles to absolve innocent suspects.…”
Section: B Categorization Of Papersmentioning
confidence: 99%
“…In [88], T. Hoppe et al introduce an overview of the digital forensics process and put this into an automotive context. They suggest using a data recorder that securely logs existing navigation data transmitted over the CAN bus.…”
Section: B Categorization Of Papersmentioning
confidence: 99%
“…For a replay attack, attackers can carefully observe message sequences during a specific time interval and save the observed message sequences [36]. Then, all or part of these legitimate message sequences are injected.…”
Section: Replay Attackmentioning
confidence: 99%
“…Between these attack paths, the first path imposes more threat because it is scalable to other vehicles, and it does not require physical access to the vehicle as malicious code injection could occur remotely [4,5]. As an example of the first attack path, the authors of [6] injected a code that monitors vehicle behavior, and if a specified condition occurs, it sends a CAN message containing an open window command to open the window. In [4], a personal computer (PC) attached to a powertrain network was used to demonstrate the danger of interfering with the CAN bus.…”
Section: Can Bus Attacksmentioning
confidence: 99%