{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:23:40Z","timestamp":1743117820625,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031171420"},{"type":"electronic","value":"9783031171437"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17143-7_32","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:04:22Z","timestamp":1663905862000},"page":"658-679","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PanoptiCANs - Adversary-Resilient Architectures for\u00a0Controller Area Networks"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Lucian","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Tudor","family":"Andreica","sequence":"additional","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"32_CR2","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)"},{"key":"32_CR3","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)"},{"key":"32_CR4","unstructured":"CAN FD - The basic idea, CAN in Automation (CiA). www.can-cia.org\/can-knowledge\/can\/can-fd\/"},{"key":"32_CR5","unstructured":"Controller Area Network Extra Long (CAN XL), CAN in Automation (CiA). www.can-cia.org\/can-knowledge\/can\/can-xl\/"},{"issue":"1","key":"32_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MVT.2017.2736344","volume":"13","author":"B Groza","year":"2018","unstructured":"Groza, B., Murvay, P.-S.: Security solutions for the controller area network: bringing authentication to in-vehicle networks. IEEE Veh. Technol. Mag. 13(1), 40\u201347 (2018)","journal-title":"IEEE Veh. Technol. Mag."},{"key":"32_CR7","unstructured":"Groza, B., Popa, L., Murvay, P.S., Elovici, Y., Shabtai, A.: CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. In: 30th USENIX Security Symposium (2021)"},{"key":"32_CR8","unstructured":"Bentham, J.: Panopticon - a plan of management for a Panopticon penitentiary-house (1791)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: Conference on Computer and Communications Security, pp. 1109\u20131123. ACM (2017)","DOI":"10.1145\/3133956.3134001"},{"key":"32_CR10","unstructured":"Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th USENIX Security Symposium (2016)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Barranco, M., Rodriguez-Navas, G., Proenza, J., Almeida, L.: CANcentrate: an active star topology for CAN networks. In: International Workshop on Factory Communication Systems, pp. 219\u2013228. IEEE (2004)","DOI":"10.1109\/WFCS.2004.1377714"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Barranco, M., Almeida, L., Proenza, J.: ReCANcentrate: a replicated star topology for CAN networks. In: Conference on Emerging Technologies and Factory Automation, vol. 2. IEEE (2005)","DOI":"10.4271\/2006-01-1023"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Obermaisser, R., Kammerer, R.: A router for improved fault isolation, scalability and diagnosis in CAN. In: 2010 8th IEEE International Conference on Industrial Informatics, pp. 123\u2013129 (2010)","DOI":"10.1109\/INDIN.2010.5549449"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Conference on Computer and Communications Security, pp. 1044\u20131055. ACM (2016)","DOI":"10.1145\/2976749.2978302"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-319-99229-7_27","volume-title":"Computer Safety, Reliability, and Security","author":"D Souma","year":"2018","unstructured":"Souma, D., Mori, A., Yamamoto, H., Hata, Y.: Counter attacks for bus-off attacks. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11094, pp. 319\u2013330. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99229-7_27"},{"key":"32_CR16","unstructured":"Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to CAN bus. Black Hat USA (2017)"},{"key":"32_CR17","unstructured":"Nie, S., Liu, L., Du, Y., Zhang, W.: Over-the-air: how we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. Black Hat USA (2018)"},{"key":"32_CR18","unstructured":"Specification of Secure Onboard Communication, 4th ed., AUTOSAR (2017)"},{"key":"32_CR19","unstructured":"Specification of crypto service manager. AUTOSAR 11, r20-11 (2020)"},{"key":"32_CR20","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Workshop on Embedded Security in Cars. Bochum (2004)"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Humayed, A., Luo, B.: Using ID-hopping to defend against targeted DoS on CAN. In: Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, NY, USA, pp. 19\u201326. Association for Computing Machinery (2017)","DOI":"10.1145\/3055378.3055382"},{"key":"32_CR22","doi-asserted-by":"publisher","first-page":"54607","DOI":"10.1109\/ACCESS.2018.2870695","volume":"6","author":"W Wu","year":"2018","unstructured":"Wu, W., et al.: IDH-CAN: a hardware-based ID hopping CAN mechanism with enhanced security for automotive real-time applications. IEEE Access 6, 54607\u201354623 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"32_CR23","doi-asserted-by":"publisher","first-page":"6129","DOI":"10.1109\/TVT.2020.2990954","volume":"69","author":"B Groza","year":"2020","unstructured":"Groza, B., Popa, L., Murvay, P.-S.: Highly efficient authentication for CAN by identifier reallocation with ordered CMACs. IEEE Trans. Veh. Technol. 69(6), 6129\u20136140 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"32_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-60876-1_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Palanca","year":"2017","unstructured":"Palanca, A., Evenchick, E., Maggi, F., Zanero, S.: A stealth, selective, link-layer denial-of-service attack against automotive networks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 185\u2013206. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_9"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Murvay, P.-S., Groza, B.: DoS attacks on controller area networks by fault injections from the software layer. In: International Conference on Availability, Reliability and Security (ARES). ACM (2017)","DOI":"10.1145\/3098954.3103174"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Broster, I., Burns, A.: An analysable bus-guardian for event-triggered communication. In: 24th IEEE Real-Time Systems Symposium in RTSS 2003, pp. 410\u2013419. IEEE (2003)","DOI":"10.1109\/REAL.2003.1253288"},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"de Moraes, P., Saotome, O., Santos, M.M.D.: Trends in Bus Guardian for Automotive Communication-CAN, TTP\/C and Flexray. SAE Technical Paper, Tech. Rep. (2011)","DOI":"10.4271\/2011-36-0308"},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Sivencrona, H., Olsson, T., Johansson, R., Torin, J.: RedCAN\/sup TM\/: simulations of two fault recovery algorithms for CAN. In: 10th IEEE Pacific Rim International Symposium on Dependable Computing, pp. 302\u2013311 (2004)","DOI":"10.1109\/PRDC.2004.1276580"},{"issue":"3","key":"32_CR29","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1109\/TIE.2016.2624261","volume":"64","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Lei, Y., Chang, Q.: Intermittent connection fault diagnosis for CAN using data link layer information. IEEE Trans. Ind. Electron. 64(3), 2286\u20132295 (2016)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"9","key":"32_CR30","doi-asserted-by":"publisher","first-page":"9151","DOI":"10.1109\/TVT.2019.2929419","volume":"68","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Yang, F., Lei, Y.: Tree-based intermittent connection fault diagnosis for controller area network. IEEE Trans. Veh. Technol. 68(9), 9151\u20139161 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"32_CR31","unstructured":"Hoff, U., Scott, D.: Challenges for wiring harness development. CAN Newsletter, pp. 14\u201319 (2020)"},{"key":"32_CR32","unstructured":"Designing a CAN network, CAN in Automation (CiA). www.can-cia.org\/can-knowledge\/can\/design-can-network\/"},{"key":"32_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"T Hoppe","year":"2008","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks \u2013 practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235\u2013248. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87698-4_21"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17143-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T13:07:32Z","timestamp":1728047252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17143-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171420","9783031171437"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17143-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}