{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:21:58Z","timestamp":1743034918954,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":22,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_10","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"227-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Communication Security Controllers"],"prefix":"10.1007","author":[{"given":"Keith","family":"Mayes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"10_CR1","unstructured":"Anderson R (2008). Security engineering: a guide to building dependable distributed systems. John Wiley, New York."},{"key":"10_CR2","unstructured":"German Federal Office for Information Security (2011). Protection Profiles. [Online Available] https:\/\/www.bsi.bund.de\/DE\/Themen\/ZertifizierungundAnerkennung\/ZertifizierungnachCCundITSEC\/SchutzprofileProtectionProfiles\/schutzprofileprotectionprofiles_node.html."},{"key":"10_CR3","unstructured":"EVITA project (20082011). E-Safety vehicle intrusion protected applications. http:\/\/www.evita-project.org."},{"key":"10_CR4","unstructured":"Hersteller Initiative Software (HIS), Working Group Security (2010). SHE Secure hardware extension version 1.1."},{"key":"10_CR5","unstructured":"ISO 11898 (20032007). Road vehicles Controller area network (CAN)."},{"key":"10_CR6","unstructured":"National Institute of Standards and Technology (2001). FIPS-140-2: Security requirements for cryptographic modules."},{"key":"10_CR7","unstructured":"Trusted Computing Group (2011). TPM Main Specification Version 1.2. [Online Available] http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Russell R (2008). Virtio: Towards a de-facto standard for virtual I\/O devices. ACM SIGOPS Operating Systems, Review (42).","DOI":"10.1145\/1400097.1400108"},{"key":"10_CR9","unstructured":"Debian GNU\/Linux FAQ (2011). Basics of the Debian package management system. [Online Available] http:\/\/www.debian.org\/doc\/FAQ\/ch-pkg_basics.en.html."},{"key":"10_CR10","unstructured":"RSA Laboratories (2004). Cryptographic Token Interface Standard 2.2."},{"key":"10_CR11","unstructured":"Universitat Politecnica de Valencia (2012). XtratuM A hypervisor specially designed for real-time embedded systems. [Online Available] www.xtratum.org."},{"key":"10_CR12","volume-title":"A unified framework for the analysis of side-channel key recovery attacks","author":"FX Standaert","year":"2009","unstructured":"Standaert FX, Malkin T, Yung M (2009). A unified framework for the analysis of side-channel key recovery attacks. Springer-Verlag, Berlin."},{"key":"10_CR13","unstructured":"IEEE 1609. Draft standards for wireless access in vehicular environments."},{"key":"10_CR14","unstructured":"ISO 15408 (2007). Information technology Security techniques Evaluation criteria for IT security."},{"key":"10_CR15","unstructured":"Scheibel M, Wolf M (2009). Security risk analysis for vehicular IT systems A business model for IT security measures. Embedded Security in Cars Workshop (escar 2009), Dsseldorf, Germany."},{"key":"10_CR16","unstructured":"European Commission Information Society (2012). Emergency call (eCall). [Online Available] http:\/\/ec.europa.eu\/information_society\/activities\/esafety\/ecall\/index_en.htm."},{"key":"10_CR17","unstructured":"Poulsen K (2010). Hacker Disables More Than 100 Cars Remotely. The WIRED Magazine."},{"key":"10_CR18","unstructured":"Eisenbarth T, Kasper T, Moradi A, Paar C et al. (2010). On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme. Springer-Verlag, Berlin."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Koscher K et al. (2010). Experimental security analysis of a modern automobile. IEEE Symposium on Security and Privacy (SP).","DOI":"10.1109\/SP.2010.34"},{"key":"10_CR20","unstructured":"Checkoway S et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. USENIX association."},{"key":"10_CR21","unstructured":"Rouf I et al. (2010). Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. USENIX association."},{"key":"10_CR22","unstructured":"OVERSEE project (2009\u20132012). Open Vehicular Secure Platform. http:\/\/www.oversee-project.com."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T16:45:23Z","timestamp":1676825123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_10","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}