O'Reilly logo

The Car Hacker's Handbook by Craig Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Footnotes

Chapter 10: Vehicle-to-Vehicle Communication

1. James Misener et al., Communications Data Delivery System Analysis: Task 2 Report: High-Level Options for Secure Communications Data Delivery Systems (Intelligent Transportation System Joint Program Office, May 16, 2012), http://ntl.bts.gov/lib/45000/45600/45615/FHWA-JPO-12-061_CDDS_Task_2_Rpt_FINAL.pdf

Chapter 12: Attacking Wireless Systems with SDR

1. Ishtiaq Rouf et al., “Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” USENIX Security ’10, Proceedings of the 19th USENIX Conference on Security, August 2010: 323–338, https://www.usenix.org/legacy/events/sec10/tech/full_papers/Rouf.pdf.
2. Samy Kamkar, “Drive It Like You ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required