{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:20:52Z","timestamp":1743034852419,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_48","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"478-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing Methods"],"prefix":"10.1007","author":[{"given":"Mitsuki","family":"Tsuneyoshi","sequence":"first","affiliation":[]},{"given":"Masahiro","family":"Miwata","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Nishii","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"48_CR1","unstructured":"Specifications according ISO 21806-1 Road vehicles\u2013MOST\u2013 Part 1: General information and definitions. https:\/\/www.mostcooperation.com\/specifications\/"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"An, Y., Park, J., Oh, I., Kim, M., Yim, K.: Design and implementation of a novel testbed for automotive security analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2020, Advances in Intelligent Systems and Computing, vol. 1195, pp. 234\u2013243. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-50399-4_23"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Asprilla, A.M., Martinez, W.H., Munoz, L.E., Cortes, C.A.: Design of an embedded hardware for motor control of a high performance electric vehicle. In: Proceedings of the IEEE Workshop on Power Electronics and Power Quality Applications (PEPQA-2017), pp. 1\u20135 (June 2017)","DOI":"10.1109\/PEPQA.2017.7981680"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Castiglione, A., Palmieri, F., Colace, F., Lombardi, M., Santaniello, D., D\u2019Aniello, G.: Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn. Lett. 135, 264\u2013270 (2020). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167865520301689","DOI":"10.1016\/j.patrec.2020.04.038"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Cena, G., Cibrario Bertolotti, I., Hu, T., Valenzano, A.: On a software-defined CAN controller for embedded systems. Comput. Stand. Interfaces 63, 43\u201351 (2019). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0920548918302101","DOI":"10.1016\/j.csi.2018.11.007"},{"key":"48_CR6","doi-asserted-by":"publisher","unstructured":"Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1044\u20131055. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978302","DOI":"10.1145\/2976749.2978302"},{"key":"48_CR7","doi-asserted-by":"publisher","unstructured":"Cho, K.T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1109\u20131123. Association for Computing Machinery, New York (2017), https:\/\/doi.org\/10.1145\/3133956.3134001","DOI":"10.1145\/3133956.3134001"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Ghallabi, F., Nashashibi, F., El-Haj-Shhade, G., Mittet, M.A.: LIDAR-based lane marking detection for vehicle positioning in an HD map. In: Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC-2018), pp. 2209\u20132214 (November 2018)","DOI":"10.1109\/ITSC.2018.8569951"},{"key":"48_CR9","unstructured":"Kidder, C.: SavvyCAN. https:\/\/github.com\/collin80\/SavvyCAN"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Lim, K., Tuladhar, K.M., Kim, H.: Detecting location spoofing using ADAS sensors in VANETs. In: Proceedings of the 16th IEEE Annual Consumer Communications Networking Conference (CCNC-2019), pp. 1\u20134 (2019)","DOI":"10.1109\/CCNC.2019.8651763"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Rabieh, K., Mahmoud, M.M.E.A., Guo, T.N., Younis, M.: Cross-layer scheme for detecting large-scale colluding sybil attack in VANETs. In: Proceedings of the IEEE International Conference on Communications (ICC-2015), pp. 7298\u20137303 (June 2015)","DOI":"10.1109\/ICC.2015.7249492"},{"key":"48_CR12","unstructured":"Smith, C.: ICSim. https:\/\/github.com\/zombieCraig\/ICSim"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Sojka, M., Pisa, P., Petera, M., Spinka, O., Hanzalek, Z.: A comparison of Linux CAN drivers and their applications. In: Proceedings of the International Symposium on Industrial Embedded System (SIES-2010), pp. 18\u201327 (July 2010)","DOI":"10.1109\/SIES.2010.5551367"},{"key":"48_CR14","unstructured":"Tan, M.T., Bailey, B., Lin, H.: Microchip AN2059: LIN basics and implementation of the MCC LIN stack library on 8-bit PIC microcontrollers. Technical report, Microchip Technology Inc. (2017). http:\/\/ww1.microchip.com\/downloads\/en\/appnotes\/00002059b.pdf"},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Vaz, R.M., Hodel, K.N., Santos, M.M., Arruda, B.A., Netto, M.L., Justo, J.F.: An efficient formulation for optimization of FlexRay frame scheduling. Veh. Commun. 24, 100234 (2020)","DOI":"10.1016\/j.vehcom.2020.100234"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Wang, T., Wei, T., Gu, G., Zou, W.: TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: Proceedings of the IEEE Symposium on Security and Privacy, vol. 2010, pp. 497\u2013512 (May 2010)","DOI":"10.1109\/SP.2010.37"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Wehner, P., Schwiegelshohn, F., Gohringer, D., Hubner, M.: Development of driver assistance systems using virtual hardware-in-the-loop. In: Proceedings of the International Symposium on Integrated Circuits (ISIC-2014), pp. 380\u2013383 (December 2014)","DOI":"10.1109\/ISICIR.2014.7029542"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:56:31Z","timestamp":1624474591000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}