{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:26:13Z","timestamp":1771064773998,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006233","type":"print"},{"value":"9783032006240","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00624-0_16","type":"book-chapter","created":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:19Z","timestamp":1754739739000},"page":"322-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Leaky Batteries: A Novel Set of\u00a0Side-Channel Attacks on\u00a0Electric Vehicles"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5282-0965","authenticated-orcid":false,"given":"Francesco","family":"Marchiori","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"16_CR1","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (general data protection regulation). Official J. Eur. Union (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Arandia, I., Cejudo, I., Irigoyen, E., Urbieta, I., Arregui, H., Loyo, E.: Analyzing the influence of driver, route and vehicle-related factors in electric vehicle energy consumption, based on real life data. In: Proceedings of the 2022 3rd International Conference on Robotics Systems and Vehicle Technology, pp. 16\u201321 (2022)","DOI":"10.1145\/3560453.3560467"},{"key":"16_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2022.131492","volume":"353","author":"K Berger","year":"2022","unstructured":"Berger, K., Sch\u00f6ggl, J.P., Baumgartner, R.J.: Digital battery passports to enable circular and sustainable value chains: conceptualization and use cases. J. Clean. Prod. 353, 131492 (2022)","journal-title":"J. Clean. Prod."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Brighente, A., Conti, M., Donadel, D., Turrin, F.: EVScout2. 0: electric vehicle profiling through charging profile. ACM Trans. Cyber-Phys. Syst. 8(2), 1\u201324 (2024)","DOI":"10.1145\/3565268"},{"issue":"3","key":"16_CR5","first-page":"309","volume":"9","author":"I Cejudo","year":"2024","unstructured":"Cejudo, I., Arandia, I., Urbieta, I., Irigoyen, E., Arregui, H., Loyo, E.: Electric vehicle battery consumption estimation model based on simulated environments. Int. J. Veh. Inf. Commun. Syst. 9(3), 309\u2013333 (2024)","journal-title":"Int. J. Veh. Inf. Commun. Syst."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Chawla, N., Singh, A., Kar, M., Mukhopadhyay, S.: Application inference using machine learning based side channel analysis. In: 2019 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2019)","DOI":"10.1109\/IJCNN.2019.8852124"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.neucom.2018.03.067","volume":"307","author":"M Christ","year":"2018","unstructured":"Christ, M., Braun, N., Neuffer, J., Kempa-Liehr, A.W.: Time series feature extraction on basis of scalable hypothesis tests (tsfresh-a Python package). Neurocomputing 307, 72\u201377 (2018)","journal-title":"Neurocomputing"},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TTE.2020.3000181","volume":"6","author":"CH Chung","year":"2020","unstructured":"Chung, C.H., Jangra, S., Lai, Q., Lin, X.: Optimization of electric vehicle charging for battery maintenance and degradation management. IEEE Trans. Transp. Electrification 6(3), 958\u2013969 (2020)","journal-title":"IEEE Trans. Transp. Electrification"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Conti, M., Donadel, D., Poovendran, R., Turrin, F.: EVExchange: a relay attack on electric vehicle charging system. In: European Symposium on Research in Computer Security, pp. 488\u2013508. Springer (2022)","DOI":"10.1007\/978-3-031-17140-6_24"},{"key":"16_CR10","unstructured":"U.S. Customs and Border Protection: CBP seizes record amount of counterfeit hoverboards (2016)"},{"key":"16_CR11","unstructured":"Efatinasab, E., Marchiori, F., Donadel, D., Brighente, A., Conti, M.: When authentication is not enough: on the security of behavioral-based driver authentication systems. arXiv preprint arXiv:2306.05923 (2023)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Gangwal, A., Jain, A., Conti, M.: On the feasibility of profiling electric vehicles through charging data. arXiv preprint arXiv:2210.05433 (2022)","DOI":"10.14722\/vehiclesec.2023.23021"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-319-21476-4_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"G Goller","year":"2015","unstructured":"Goller, G., Sigl, G.: Side channel attacks on smartphones and embedded devices using standard radio equipment. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 255\u2013270. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_17"},{"issue":"17","key":"16_CR14","doi-asserted-by":"publisher","first-page":"15666","DOI":"10.1109\/JIOT.2023.3265185","volume":"10","author":"L Kang","year":"2023","unstructured":"Kang, L., Shen, H., Xu, S., Li, Y.: Electric vehicle trip information inference based on time-series residential electricity consumption. IEEE Internet Things J. 10(17), 15666\u201315678 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"16_CR15","doi-asserted-by":"publisher","first-page":"3798","DOI":"10.3390\/en15103798","volume":"15","author":"L Kong","year":"2022","unstructured":"Kong, L., Das, D., Pecht, M.G.: The distribution and detection issues of counterfeit lithium-ion batteries. Energies 15(10), 3798 (2022)","journal-title":"Energies"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"La\u00a0Cour, A.S., Afridi, K.K., Suh, G.E.: Wireless charging power side-channel attacks. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 651\u2013665 (2021)","DOI":"10.1145\/3460120.3484733"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Lotto, A., Marchiori, F., Brighente, A., Conti, M.: A survey and comparative analysis of security properties of can authentication protocols. IEEE Commun. Surv. Tutorials (2024)","DOI":"10.1109\/COMST.2024.3486367"},{"key":"16_CR18","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol. 30, pp. 4765\u20134774. Curran Associates, Inc. (2017). http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Marchiori, F., Conti, M.: Your battery is a blast! Safeguarding against counterfeit batteries with authentication. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 105\u2013119 (2023)","DOI":"10.1145\/3576915.3623179"},{"key":"16_CR20","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA 2014, 1\u201320 (2014)"},{"key":"16_CR21","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91), 1\u201391 (2015)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Mishra, S., Swain, S.C., Samantaray, R.K.: A review on battery management system and its application in electric vehicle. In: 2021 International Conference on Advances in Computing and Communications (ICACC), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/ICACC-202152719.2021.9708114"},{"key":"16_CR23","unstructured":"Motion, R.: Over 17 million EVS sold in 2024 - record year (2025). https:\/\/rhomotion.com\/news\/over-17-million-evs-sold-in-2024-record-year\/"},{"key":"16_CR24","unstructured":"O\u2019Brien, M., Tatarka, G.: Lithium-ion batteries: an emerging focus of causation in consumer product fires. White Paper. Wilson Elser Moskowitz & Dicker LLP (2008)"},{"key":"16_CR25","unstructured":"European Parliament: Cybersecurity act (EU) 2019\/881. European Union (2019). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32019R0881"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Pese, M.D.: A first look at android automotive privacy. Technical report, SAE Technical Paper (2023)","DOI":"10.4271\/2023-01-0037"},{"key":"16_CR27","unstructured":"Tindell, K.: Can injection: keyless car theft, April 2023. https:\/\/kentindell.github.io\/2023\/04\/03\/can-injection\/"},{"key":"16_CR28","unstructured":"UNECE: Un regulation no. 155: Cybersecurity and cybersecurity management system (2021). https:\/\/unece.org\/transport\/documents\/2021\/03\/standards\/un-regulation-no-155-cyber-security-and-cyber-security"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Yu, H., Tseng, F., McGee, R.: Driving pattern identification for EV range estimation. In: 2012 IEEE International Electric Vehicle Conference, pp.\u00a01\u20137. IEEE (2012)","DOI":"10.1109\/IEVC.2012.6183207"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00624-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:59:31Z","timestamp":1757361571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00624-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006233","9783032006240"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00624-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}