{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:06:30Z","timestamp":1759334790649,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944543"},{"type":"electronic","value":"9783031944550"}],"license":[{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94455-0_18","type":"book-chapter","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T09:23:59Z","timestamp":1756977839000},"page":"384-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AutoS$$^2$$ploit: From Automotive Safety-Critical Functionalities to\u00a0Security Exploit"],"prefix":"10.1007","author":[{"given":"Nan","family":"Zhuang","sequence":"first","affiliation":[]},{"given":"Haonan","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"key":"18_CR1","unstructured":"Ribbens, W.B.: Understanding automotive electronics, an engineering perspective. ISBN 978-0-12-810434-7 (2017)"},{"key":"18_CR2","unstructured":"Bosch. CAN Specification Version 2.0. 1991, Robert Bosch GmbH"},{"key":"18_CR3","unstructured":"https:\/\/cve.mitre.org\/"},{"key":"18_CR4","unstructured":"Miller, C., Valasek, C.: Can message injection. OG Dynamite Edition (2016)"},{"key":"18_CR5","unstructured":"Toyota prius - Engine control systems. www.autoshop101.com"},{"key":"18_CR6","unstructured":"Elm327dsk. www.elmelectronics.com\/wp-content\/uploads\/2017\/01\/ELM327DS.pdf"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-99073-6_15","volume-title":"Computer Security","author":"J Van den Herrewegen","year":"2018","unstructured":"Van den Herrewegen, J., Garcia, F.D.: Beneath the bonnet: a breakdown of diagnostic security. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 305\u2013324. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_15"},{"key":"18_CR8","unstructured":"Wen, H., Chen, Q., et al.: Plug-N-Pwned: comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT. USENIX Security (2020)"},{"key":"18_CR9","unstructured":"Electronic diesel control EDC 16. https:\/\/vwcampersite.files.wordpress.com\/2015\/01\/ssp$_$304-electronic-diesel-control-edc16.pdf"},{"key":"18_CR10","unstructured":"Kleinknecht, H.: Can Calibration Protocol Version 2.1. Germany: ASAM eV, pp. 2\u201318 (1999)"},{"key":"18_CR11","unstructured":"OBD11\/VCDS security access codes. https:\/\/www.vwvortex.com\/threads\/obd11-vcds-security-access-codes.9344787\/"},{"key":"18_CR12","first-page":"91","volume":"2015","author":"C Miller","year":"2015","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)","journal-title":"Black Hat USA"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: 2011 IEEE Intelligent Vehicles Symposium, pp. 528\u2013533 (2011)","DOI":"10.1109\/IVS.2011.5940525"},{"key":"18_CR14","unstructured":"Mazloom, S., Rezaeirad, M., Hunter, A., McCoy, D.: A security analysis of an in-vehicle infotainment and app platform. WOOT (2016)"},{"key":"18_CR15","unstructured":"Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Black Hat USA (2017)"},{"key":"18_CR16","unstructured":"Bono, S., Green, M., Stubblefield, A., et\u00a0al.: Security analysis of a cryptographically-Enabled RFID Device. USENIX Security, pp. 1\u201316 (2005)"},{"key":"18_CR17","unstructured":"Verdult, R., Garcia, F.D.: Cryptanalysis of the Megamos crypto automotive immobilizer. USENIX, pp. 17\u201322 (2015)"},{"key":"18_CR18","unstructured":"Verdult, R., Garcia, F.D., Balasch, J. Gone in 360 seconds: hijacking with Hitag2. USENIX Security, pp. 237\u2013252 (2012)"},{"key":"18_CR19","first-page":"703","volume-title":"Wirelessly lockpicking a vehicle immobilizer","author":"R Verdult","year":"2013","unstructured":"Verdult, R., Garcia, F.D., Ege, B.: Wirelessly lockpicking a vehicle immobilizer, pp. 703\u2013718. USENIX Security, Dismantling Megamos Cryptopp (2013)"},{"key":"18_CR20","isbn-type":"print","volume-title":"Bosch Fuel injection and engine management","author":"C Probst","year":"1989","unstructured":"Probst, C.: Bosch Fuel injection and engine management. Robert Bentley, Incorporated (1989)978-0-8376-0300-1","ISBN":"https:\/\/id.crossref.org\/isbn\/9780837603001"},{"key":"18_CR21","unstructured":"Crypto-GPS: ISO\/IEC 29167-17:2015 Information technology automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: International Algorithmic Number Theory Symposium (1998)","DOI":"10.1007\/BFb0054868"},{"key":"18_CR23","unstructured":"CANape. www.vector.com\/int\/en\/products\/products-a-z\/software\/canape\/"},{"key":"18_CR24","unstructured":"AUTOSAR CP R19-11. Specification of Module XCP. https:\/\/www.autosar.org\/ fileadmin\/standards\/R19-11\/CP\/AUTOSAR_SWS_XCP.pdf"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., et al.: DolphinAttack: inaudible voice commands. In: ACM CCS 2017, pp. 103\u2013117 (2017)","DOI":"10.1145\/3133956.3134052"},{"key":"18_CR26","unstructured":"Tu, Y., Lin, Z., Lee, I., Hei, X.: Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. USENIX Security 2018 (2018)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xiao, C., Cyr, B., et\u00a0al.: Adversarial sensor attack on LiDAR-based perception in autonomous driving. ACM CCS (2019)","DOI":"10.1145\/3319535.3339815"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Kneib, M., Huth, C.: Scission: signal characteristic-based sender identification and intrusion detection in automotive networks. ACM CCS (2018)","DOI":"10.1145\/3243734.3243751"},{"key":"18_CR29","unstructured":"Vehicles supported list. https:\/\/www.turboperformance.shop\/media\/pdf\/56\/50 \/a8\/2015VehiclesSupported-ListaVeicoliSupportati-relB3TvpiyQVVBzB50.pdf"},{"key":"18_CR30","unstructured":"Bosch ECU database. https:\/\/www.weboctopus.nl\/ecu-database.php"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Cho, K.-T., Shin, K.G.: VIDEN: attacker identification on in-vehicle networks. In: ACM CCS 2017, pp. 1109\u20131123 (2017)","DOI":"10.1145\/3133956.3134001"},{"key":"18_CR32","unstructured":"Association of Standardisation and Automation and Measuring Systems. The Universal Measurement and Calibration Protocol Family (2016)"},{"key":"18_CR33","unstructured":"ISO 14230-1- Road vehicle \u2013 Diagnostics Systems \u2013 Keyword Protocol 2000. Part 1: Physical layer (1999)"},{"key":"18_CR34","unstructured":"ISO 14230-2 - Road vehicles \u2013 Diagnostics Systems - Keyword Protocol 2000. Part 2: Data link layer (1999)"},{"key":"18_CR35","unstructured":"ISO 14230-3- Road vehicles \u2013 Diagnostics Systems - Keyword Protocol 2000. Part 3: Application layer (1999)"},{"key":"18_CR36","unstructured":"ISO 14229-1. Road vehicles-Unified diagnostic services (UDS) Specification and requirements. 2020"},{"key":"18_CR37","unstructured":"ASAM MCD-2 MC Description. www.asam.net\/standards\/detail\/mcd-2-mc\/wiki"},{"key":"18_CR38","unstructured":"How to repair the bad starting when hot on VW 1.9 tdi EDC16U1 using WinOLS. https:\/\/www.youtube.com\/watch?v=tzo2Yanh-1w"},{"key":"18_CR39","unstructured":"OBD-II PIDs. http:\/\/obdcon.sourceforge.net\/2010\/06\/obd-iipids\/"},{"key":"18_CR40","unstructured":"STM32. https:\/\/www.st.com\/resource\/en\/datasheet\/stm32f103rc.pdf"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Zuo, C., Wang, W., et\u00a0al.: Automatic forgery of cryptographically consistent messages to identify security vulnerabilities in mobile services. NDSS (2016)","DOI":"10.14722\/ndss.2016.23146"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Zuo, C., Zhao, Q., Lin, Z.: AuthScope: towards automatic discovery of vulnerable authorizations in online services. In: ACM CCS (2017)","DOI":"10.1145\/3133956.3134089"},{"key":"18_CR43","volume-title":"Why does your data leak?","author":"C Zuo","year":"2019","unstructured":"Zuo, C., Lin, Z., Zhang, Y.: Why does your data leak? Uncovering the data leakage in cloud from mobile apps, IEEE SP (2019)"},{"key":"18_CR44","first-page":"929","volume":"2016","author":"FD Garcia","year":"2016","unstructured":"Garcia, F.D., Oswald, D., et al.: Lock it and still lose it-on the (in) security of automotive remote keyless entry systems. USENIX Sec. 2016, 929\u2013944 (2016)","journal-title":"USENIX Sec."},{"key":"18_CR45","unstructured":"SAE J1979 protocol. E\/E diagnostic test modes. https:\/\/www.sae.org\/standards\/ content\/j1979_201702\/"},{"key":"18_CR46","unstructured":"K-Tag. https:\/\/www.alientech-tools.com\/k-tag\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94455-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T22:22:31Z","timestamp":1759270951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94455-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,5]]},"ISBN":["9783031944543","9783031944550"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94455-0_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,5]]},"assertion":[{"value":"5 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}