{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:39Z","timestamp":1762005339121,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030884178"},{"type":"electronic","value":"9783030884185"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88418-5_32","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:04:30Z","timestamp":1632949470000},"page":"668-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]},{"given":"Lucian","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Camil","family":"Jichici","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"unstructured":"AUTOSAR: Specification of Secure Onboard Communication, 4.3.1 edn. (2017)","key":"32_CR1"},{"unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium. San Francisco (2011)","key":"32_CR2"},{"doi-asserted-by":"crossref","unstructured":"Cho, K.T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1109\u20131123. ACM (2017)","key":"32_CR3","DOI":"10.1145\/3133956.3134001"},{"issue":"6","key":"32_CR4","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TVT.2018.2810232","volume":"67","author":"W Choi","year":"2018","unstructured":"Choi, W., Jo, H.J., Woo, S., Chun, J.Y., Park, J., Lee, D.H.: Identifying ECUs using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Technol. 67(6), 4757\u20134770 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"32_CR5","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","volume":"16","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: low-level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 16(8), 2114\u20132129 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the CAN bus. ESCAR EUROPE 34 (2016)","key":"32_CR6"},{"doi-asserted-by":"crossref","unstructured":"Foruhandeh, M., Man, Y., Gerdes, R., Li, M., Chantem, T.: SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. In: Proceedings of 35th Annual Computer Security Applications Conference, pp. 229\u2013244 (2019)","key":"32_CR7","DOI":"10.1145\/3359789.3359834"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-319-66402-6_27","volume-title":"Computer Security","author":"S Fr\u00f6schle","year":"2017","unstructured":"Fr\u00f6schle, S., St\u00fchring, A.: Analyzing the capabilities of the CAN attacker. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 464\u2013482. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_27"},{"unstructured":"Groza, B., Popa, L., Murvay, P.S., Yuval, E., Shabtai, A.: CANARY - a reactive defense mechanism for controller area networks based on active RelaYs. In: 30th USENIX Security Symposium (2021)","key":"32_CR9"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-58951-6_8","volume-title":"Computer Security","author":"A Humayed","year":"2020","unstructured":"Humayed, A., Li, F., Lin, J., Luo, B.: CANSentry: securing CAN-based cyber-physical systems against denial and spoofing attacks. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 153\u2013173. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_8"},{"doi-asserted-by":"crossref","unstructured":"Humayed, A., Luo, B.: Using ID-hopping to defend against targeted DoS on CAN. In: International Workshop on Safe Control of Connected and Autonomous Vehicles, pp. 19\u201326. ACM (2017)","key":"32_CR11","DOI":"10.1145\/3055378.3055382"},{"unstructured":"ISO: 11898-1-Road vehicles-Controller area network (CAN)-Part 1: Data link layer and physical signalling. Technical report, International Organization for Standardization (2015)","key":"32_CR12"},{"unstructured":"ISO: 11898\u20132, Road vehicles Controller area network (CAN) Part 2: High-speed medium access unit. Technical report, International Organization for Standardization (2016)","key":"32_CR13"},{"doi-asserted-by":"crossref","unstructured":"Kneib, M., Huth, C.: Scission: signal characteristic-based sender identification and intrusion detection in automotive networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 787\u2013800. ACM (2018)","key":"32_CR14","DOI":"10.1145\/3243734.3243751"},{"unstructured":"Kneib, M., Schell, O., Huth, C.: On the Robustness of Signal Characteristic-Based Sender Identification. arXiv preprint arXiv:1911.09881 (2019)","key":"32_CR15"},{"doi-asserted-by":"crossref","unstructured":"Kneib, M., Schell, O., Huth, C.: EASI: edge-based sender identification on resource-constrained platforms for automotive networks. In: Network and Distributed System Security Symposium (NDSS), pp. 1\u201316 (2020)","key":"32_CR16","DOI":"10.14722\/ndss.2020.24025"},{"doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Security and Privacy (SP), 2010 IEEE Symposium on, pp. 447\u2013462. IEEE (2010)","key":"32_CR17","DOI":"10.1109\/SP.2010.34"},{"key":"32_CR18","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEF CON 21, 260\u2013264 (2013)","journal-title":"DEF CON"},{"issue":"4","key":"32_CR19","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/LSP.2014.2304139","volume":"21","author":"PS Murvay","year":"2014","unstructured":"Murvay, P.S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Signal Process. Lett. 21(4), 395\u2013399 (2014)","journal-title":"IEEE Signal Process. Lett."},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"68895","DOI":"10.1109\/ACCESS.2020.2985326","volume":"8","author":"PS Murvay","year":"2020","unstructured":"Murvay, P.S., Groza, B.: TIDAL-CAN: differential timing based intrusion detection and localization for controller area network. IEEE Access 8, 68895\u201368912 (2020)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Rumez, M., et al.: CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry (2019)","key":"32_CR21","DOI":"10.1109\/VNC48660.2019.9062819"},{"unstructured":"SAE: J2284\u20133 High-Speed CAN (HSC) for Vehicle Applications at 500 KBPS. Standard, SAE International (November 2016)","key":"32_CR22"},{"doi-asserted-by":"crossref","unstructured":"Schell, O., Kneib, M.: VALID: voltage-based lightweight intrusion detection for the controller area network. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 225\u2013232 (2020)","key":"32_CR23","DOI":"10.1109\/TrustCom50675.2020.00041"},{"key":"32_CR24","doi-asserted-by":"publisher","first-page":"54607","DOI":"10.1109\/ACCESS.2018.2870695","volume":"6","author":"W Wu","year":"2018","unstructured":"Wu, W., et al.: IDH-CAN: a hardware-based ID hopping CAN mechanism with enhanced security for automotive real-time applications. IEEE Access 6, 54607\u201354623 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Ying, X., Bernieri, G., Conti, M., Poovendran, R.: TACAN: transmitter authentication through covert channels in controller area networks. In: Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems, pp. 23\u201334. ACM (2019)","key":"32_CR25","DOI":"10.1145\/3302509.3313783"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88418-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:31:45Z","timestamp":1632951105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88418-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884178","9783030884185"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88418-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}