Y. Shoukry, Non-invasive spoofing attacks for anti-lock braking systems, Cryptographic Hardware and Embedded Systems -CHES 2013, pp.55-72, 2013.

W. Marko, Wanna drive? feasible attack paths and effective protection against ransomware in modern vehicles, ESCAR 2017, 2017. oMAC : Open Model for Automotive Cybersecurity

M. and T. Garip, Congestion attacks to autonomous cars using vehicular botnets, NDSS 2015, 2015.

, ISO. ISO/SAE CD 21434 Road Vehicles -Cybersecurity engineering, 2018.

, ISO. ISO 26262 Road vehicles -Functional safety, 2011.

A. Greenberg, Hackers remotely kill a jeep on the highway -with me in it. Online, 2015.

. Embitel, Understanding how iso 26262 asil is determined for automotive applications. Online, 2018.

M. Kumar, Chinese hackers find over a dozen vulnerabilities in bmw cars, Online, 2018.

A. M. Harrison, Protection in operating systems, Communications of ACM, vol.19, issue.8, pp.461-471, 1976.

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63-9, 1975.

M. Enterprise, Stealth attacks: Why hackers love networks that are 'crunchy on the outside and chewy on the inside'. Online, 2014.

, EPA Office of Transportation and Air Quality, 1996.

. Cea and . Ces, Cea tech to exhibit at ces las vegas on january 8-11 imagine the car of tomorrow, Online, 2019.

. Nfv-white-paper, Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges & Call for Action, vol.1, 2012.

N. Freed, Behavior of and requirements for internet firewalls, RFC, vol.2979, pp.1-7, 2000.

P. Moore, Introduction to labeled networking on linux. Online, 2008.

, Learn about firewall evolution from packet filter to next generation. Online, 2015.

, Vector cyber security solution -vhsm firmware, Online, 2018.

, Rpc: Remote procedure call protocol specification, RFC, vol.1050, pp.1-24, 1988.

, Common Object Request Broker Architecture (CORBA) Specification, Version 3.3, 2012.

, Object Management Group. Data Distribution Service Version, vol.1, issue.4, 2015.

. Autosar, , 2017.

B. Venelle, Mandatory access control for object systems: defense in depth for Java objects, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01320558

, DoD 5200.28-STD. Orange Book. Dod Computer Security Center, 1985.

, Autosar consortium. SOME/IP Protocol Specification, 2016.

, IEC. IEC 62439-3:2016 RLV Redline version Industrial communication networks -High availability automation networks -Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR), 2016.

M. Dworkin, Nist special publication 800-38b recommendation for block cipher modes of operation: The cmac mode for authentication

, Ieee 802.3bw-2015 -ieee standard for etherenet amendment 1: Physical layer specifications and management parameters for 100 mb/s operation over a single balanced twisted pair cable (100base-t1), 2015.

, Ieee p802.3cg 10 mb/s single pair ethernet task force. Standard, 2018.

. Autosar, , 2017.

A. S. Tanenbaum, Modern operating systems, 2014.