{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T07:16:25Z","timestamp":1778310985024,"version":"3.51.4"},"publisher-location":"Cham","reference-count":69,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957635","type":"print"},{"value":"9783031957642","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95764-2_17","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:45:28Z","timestamp":1750315528000},"page":"429-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CANTXSec: A Deterministic Intrusion Detection and\u00a0Prevention System for\u00a0CAN Bus Monitoring ECU Activations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8518-0982","authenticated-orcid":false,"given":"Kavya","family":"Balasubramanian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4952-5380","authenticated-orcid":false,"given":"Bhaskar","family":"Ramasubramanian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-8097","authenticated-orcid":false,"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"17_CR1","unstructured":"Arduino: Arduino: open-source electronic prototyping platform enabling users to create interactive electronic objects. https:\/\/www.arduino.cc\/ (February 2023)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Balasubramanian, K., et al.: CANLP: A NLP-based intrusion detection system for CAN. In: Proceedings of the 2024 ACM\/ SIGAPP Symposium on Applied Computing, pp. 212\u2013214 (2024)","DOI":"10.1145\/3605098.3636083"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bhatia, R., Kumar, V., Serag, K., Celik, Z.B., Payer, M., Xu, D.: Evading voltage-based intrusion detection on automotive can. In: NDSS (2021)","DOI":"10.14722\/ndss.2021.23013"},{"key":"17_CR4","unstructured":"bitbane: CANT (2016). https:\/\/github.com\/bitbane\/CANT, defcon 26 Car Hacking Village"},{"key":"17_CR5","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: 20th USENIX security symposium (USENIX Security 11) (2011)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chiscop, I., Gazdag, A., Bosman, J., Bicz\u00f3k, G.: Detecting message modification attacks on the can bus with temporal convolutional networks. arXiv preprint arXiv:2106.08692 (2021)","DOI":"10.5220\/0010445504880496"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1044\u20131055 (2016)","DOI":"10.1145\/2976749.2978302"},{"key":"17_CR8","unstructured":"commaai: opendbc. https:\/\/github.com\/commaai\/opendbc (2023). Accessed Aug 13 2023"},{"key":"17_CR9","unstructured":"Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the can bus. ESCAR EUROPE 34 (2016)"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"166855","DOI":"10.1109\/ACCESS.2021.3136147","volume":"9","author":"PF De Araujo-Filho","year":"2021","unstructured":"De Araujo-Filho, P.F., Pinheiro, A.J., Kaddoum, G., Campelo, D.R., Soares, F.L.: An efficient intrusion prevention system for can: hindering cyber-attacks with a low-cost platform. IEEE Access 9, 166855\u2013166869 (2021)","journal-title":"IEEE Access"},{"key":"17_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100470","volume":"35","author":"AK Desta","year":"2022","unstructured":"Desta, A.K., Ohira, S., Arai, I., Fujikawa, K.: Rec-CNN: In-vehicle networks intrusion detection using convolutional neural networks trained on recurrence plots. Vehicular Commun. 35, 100470 (2022)","journal-title":"Vehicular Commun."},{"key":"17_CR12","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1612","volume-title":"CAN crypto FPGA Chip to Secure Data Transmitted Through can FD Bus Using AES-128 and SHA-1 Algorithms with a Symmetric Key","author":"TP Doan","year":"2017","unstructured":"Doan, T.P., Ganesan, S.: CAN crypto FPGA Chip to Secure Data Transmitted Through can FD Bus Using AES-128 and SHA-1 Algorithms with a Symmetric Key. Tech. rep, SAE Technical Paper (2017)"},{"key":"17_CR13","unstructured":"Elend, B., Adamson, T.: Cyber security enhancing CAN transceivers (2017)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"de\u00a0Faveri\u00a0Tron, A., Longari, S., Carminati, M., Polino, M., Zanero, S.: Canflict: exploiting peripheral conflicts for data-link layer attacks on automotive networks. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 711\u2013723 (2022)","DOI":"10.1145\/3548606.3560618"},{"key":"17_CR15","unstructured":"Foster, I., Prudhomme, A., Koscher, K., Savage, S.: Fast and vulnerable: a story of telematic failures. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35404-5_15"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Halabi, J., Artail, H.: A lightweight synchronous cryptographic hash chain solution to securing the vehicle can bus. In: 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/IMCET.2018.8603057"},{"key":"17_CR18","unstructured":"Hammerschmidt, C.: Number of automotive ecus continues to rise. https:\/\/www.eenewseurope.com\/en\/number-of-automotive-ecus-continues-to-rise\/ (May 2019). Accessed 13 Dec 2023"},{"key":"17_CR19","unstructured":"Hartkopp, O., Reuber, C., Schilling, R.: Macan-message authenticated can. In: 10th International Conference on Embedded Security in Cars (ESCAR 2012) (2012)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Iehira, K., Inoue, H., Ishida, K.: Spoofing attack using bus-off attacks against a specific ECU of the can bus. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.\u00a01\u20134. IEEE (2018)","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"17_CR21","unstructured":"International Standard Organization (ISO): CAN Standard ISO 11898-1:2015. www.iso.org\/standard\/63648.html (2015). Accessed 23 Aug 2023"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Iqbal, S., Haque, A., Zulkernine, M.: Towards a security architecture for protecting connected vehicles from malware. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) pp.\u00a01\u20135. IEEE (2019)","DOI":"10.1109\/VTCSpring.2019.8746516"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Jin, S., Chung, J.G., Xu, Y.: Signature-based intrusion detection system (ids) for in-vehicle can bus network. In: 2021 IEEE International Symposium on Circuits and Systems (ISCAS), pp.\u00a01\u20135. IEEE (2021)","DOI":"10.1109\/ISCAS51556.2021.9401087"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Kalutarage, H.K., Al-Kadri, M.O., Cheah, M., Madzudzo, G.: Context-aware anomaly detector for monitoring cyber attacks on automotive can bus. In: Proceedings of the 3rd ACM Computer Science in Cars Symposium pp.\u00a01\u20138 (2019)","DOI":"10.1145\/3359999.3360496"},{"key":"17_CR25","unstructured":"Karthik, T., et al.: Uptane: securing software updates for automobiles. In: International Conference on Embedded Security in Car, pp. 1\u201311 (2016)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Koscher, K., et\u00a0al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Toth, T.: Using decision trees to improve signature-based intrusion detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 173\u2013191. Springer (2003)","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"17_CR28","unstructured":"KT Secure: Software Code Signing (2023). https:\/\/ktsecure.co.uk\/services\/software-code-signing\/. Accessed 15 Jan 2024"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Kulandaivel, S., Jain, S., Guajardo, J., Sekar, V.: Cannon: Reliable and stealthy remote shutdown attacks via unaltered automotive microcontrollers. In: 2021 IEEE Symposium on Security and Privacy (SP). pp. 195\u2013210. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00122"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1484-3","volume":"2019","author":"SF Lokman","year":"2019","unstructured":"Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive controller area network (can) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, 1\u201317 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"17_CR31","doi-asserted-by":"publisher","unstructured":"Lotto, A., Marchiori, F., Brighente, A., Conti, M.: A survey and comparative analysis of security properties of can authentication protocols. IEEE Communications Surveys & Tutorials, pp.\u00a01\u20131 (2024). https:\/\/doi.org\/10.1109\/COMST.2024.3486367","DOI":"10.1109\/COMST.2024.3486367"},{"key":"17_CR32","unstructured":"Maggi, F.: A vulnerability in modern automotive standards and how we exploited it. Trend Micro (2017)"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of preventing unauthorized data transmission in controller area network. In: 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), pp.\u00a01\u20135. IEEE (2012)","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"17_CR34","unstructured":"Microchip: SN65HVD230: 3.3 V CAN Transceiver with Standby Mode (4 2018), rev. 0"},{"key":"17_CR35","unstructured":"Microchip: MCP2515: Stand-Alone CAN Controller with SPI Interface (4 2021), rev. K"},{"key":"17_CR36","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91), 1\u201391 (2015)"},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"Minawi, O., Whelan, J., Almehmadi, A., El-Khatib, K.: Machine learning-based intrusion detection system for controller area networks. In: Proceedings of the 10th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 41\u201347 (2020)","DOI":"10.1145\/3416014.3424581"},{"issue":"4","key":"17_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1\u201329 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Phung, P.H., Larson, U.E.: Vehicle ECU classification based on safety-security characteristics. In: IET Road Transport Information and Control-RTIC 2008 and ITS United Kingdom Members\u2019 Conference, pp.\u00a01\u20137. IET (2008)","DOI":"10.1049\/ic.2008.0810"},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"N\u00fcrnberger, S., Rossow, C.: \u2013vatican\u2013vetted, authenticated can bus. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings 18, pp. 106\u2013124. Springer (2016)","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"17_CR41","unstructured":"NXP: Secure TJA115x CAN Transceiver Family (1 2020), rev. 3"},{"key":"17_CR42","doi-asserted-by":"crossref","unstructured":"Onuma, Y., Terashima, Y., Nakamura, S., Kiyohara, R.: A method of ECU software updating. In: 2018 International Conference on Information Networking (ICOIN), pp. 298\u2013303. IEEE (2018)","DOI":"10.1109\/ICOIN.2018.8343129"},{"key":"17_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-60876-1_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Palanca","year":"2017","unstructured":"Palanca, A., Evenchick, E., Maggi, F., Zanero, S.: A stealth, selective, link-layer denial-of-service attack against automotive networks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 185\u2013206. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_9"},{"key":"17_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103091","volume":"126","author":"SB Park","year":"2023","unstructured":"Park, S.B., Jo, H.J., Lee, D.H.: Flooding attack mitigator for in-vehicle can using fault confinement in can protocol. Comput. Secur. 126, 103091 (2023)","journal-title":"Comput. Secur."},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Pes\u00e9, M.D., Stacer, T., Campos, C.A., Newberry, E., Chen, D., Shin, K.G.: LibreCAN: automated can message translator. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2283\u20132300 (2019)","DOI":"10.1145\/3319535.3363190"},{"key":"17_CR46","unstructured":"phil-eqtech: CH-Workshop. https:\/\/github.com\/phil-eqtech\/CH-Workshop (2020). Accessed Dec 13 2023"},{"issue":"4","key":"17_CR47","doi-asserted-by":"publisher","first-page":"62","DOI":"10.2478\/v10012-008-0058-9","volume":"16","author":"A Pi\u0119tak","year":"2009","unstructured":"Pi\u0119tak, A., Mikulski, M.: On the adaptation of can bus network for use in the ship electronic systems. Polish Maritime Res. 16(4), 62\u201369 (2009)","journal-title":"Polish Maritime Res."},{"key":"17_CR48","unstructured":"Punde, A.: Understanding risks in over the air firmware upgrade for automotives including EVS. https:\/\/www.einfochips.com\/blog\/understanding-risks-in-over-the-air-firmware-upgrade-for-automotives-including-evs\/ (January 2023)"},{"key":"17_CR49","unstructured":"Raspberry Pi Foundation: Raspberry Pi: Putting the power of computing and digital making into the hands of people all over the world. https:\/\/www.raspberrypi.org\/ (February 2023)"},{"key":"17_CR50","unstructured":"Sagong, S.U., Ying, X., Poovendran, R., Bushnell, L.: Exploring attack surfaces of voltage-based intrusion detection systems in controller area networks. In: Proceedings of ESCAR Eur, pp. 1\u201313 (2018)"},{"key":"17_CR51","doi-asserted-by":"crossref","unstructured":"Schell, O., Kneib, M.: Valid: Voltage-based lightweight intrusion detection for the controller area network. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 225\u2013232. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00041"},{"key":"17_CR52","unstructured":"SeeedStudio: CAN-BUS Shield V2 - high-performance MCP2515 controller & MCP2551 transceiver. https:\/\/www.seeedstudio.com\/CAN-BUS-Shield-V2.html (February 2023)"},{"key":"17_CR53","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/PST.2018.8514157"},{"key":"17_CR54","unstructured":"Serag, K., et al.: ZBCAN: a zero-byte can defense system. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 6893\u20136910 (2023)"},{"key":"17_CR55","unstructured":"Serag, K., Bhatia, R., Kumar, V., Celik, Z.B., Xu, D.: Exposing new vulnerabilities of error handling mechanism in can. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 4241\u20134258 (2021)"},{"key":"17_CR56","doi-asserted-by":"crossref","unstructured":"Serag, K., Kumar, V., Celik, Z.B., Bhatia, R., Payer, M., Xu, D.: Attacks on can error handling mechanism. In: International Workshop on Automotive and Autonomous Vehicle Security (AutoSec) (2022)","DOI":"10.14722\/autosec.2022.23013"},{"key":"17_CR57","doi-asserted-by":"crossref","unstructured":"Siddiqui, A.S., Gui, Y., Plusquellic, J., Saqib, F.: Secure communication over canbus. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1264\u20131267. IEEE (2017)","DOI":"10.1109\/MWSCAS.2017.8053160"},{"key":"17_CR58","unstructured":"SK Pang Electronics: PiCAN2 Duo CAN-Bus Board for Raspberry Pi. https:\/\/copperhilltech.com\/pican2-duo-can-bus-board-for-raspberry-pi\/ (February 2023)"},{"key":"17_CR59","doi-asserted-by":"crossref","unstructured":"Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63\u201368. IEEE (2016)","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"17_CR60","volume":"21","author":"HM Song","year":"2020","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)","journal-title":"Veh. Commun."},{"key":"17_CR61","unstructured":"STMicroelectronics: Stm32 nucleo-144 development board with stm32h743zi mcu. https:\/\/www.st.com\/en\/evaluation-tools\/nucleo-h743zi.html\/ (February 2023)"},{"key":"17_CR62","unstructured":"STMicroelectronics: Interrupt overview - stm32mpu (2024). https:\/\/wiki.st.com\/stm32mpu\/wiki\/Interrupt_overview. Accessed Jan 15 2024"},{"key":"17_CR63","doi-asserted-by":"crossref","unstructured":"Takada, M., Osada, Y., Morii, M.: Counter attack against the bus-off attack on can. In: 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), pp. 96\u2013102. IEEE (2019)","DOI":"10.1109\/AsiaJCIS.2019.00004"},{"key":"17_CR64","doi-asserted-by":"crossref","unstructured":"Taylor, A., Japkowicz, N., Leblanc, S.: Frequency-based anomaly detection for the automotive can bus. In: 2015 World Congress on Industrial Control Systems Security (WCICSS), pp. 45\u201349. IEEE (2015)","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"17_CR65","unstructured":"Thompson, S.: Application of controller area network bus and CANopen protocol in Industrial Automation. Ph.D. thesis, Murdoch University (2018)"},{"key":"17_CR66","unstructured":"Tindell, K.: CAN Bus Security - Attacks on CAN bus and their mitigations. Canis Labs White Paper (2019)"},{"key":"17_CR67","unstructured":"Tindell, K.: Can injection: keyless car theft. https:\/\/kentindell.github.io\/2023\/04\/03\/can-injection\/ (April 2023)"},{"key":"17_CR68","doi-asserted-by":"crossref","unstructured":"Xu, T., Lu, X., Xiao, L., Tang, Y., Dai, H.: Voltage based authentication for controller area networks with reinforcement learning. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp.\u00a01\u20135. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761744"},{"key":"17_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, M., Masrur, A.: Improving timing behavior on encrypted can buses. In: 2019 IEEE 25th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/RTCSA.2019.8864567"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95764-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:45:49Z","timestamp":1750315549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95764-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957635","9783031957642"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95764-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}