{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:25:26Z","timestamp":1757622326898,"version":"3.44.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006295"},{"type":"electronic","value":"9783032006301"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00630-1_1","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:37:03Z","timestamp":1754660223000},"page":"5-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Profiling Electric Vehicles via\u00a0Early Charging Voltage Patterns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5282-0965","authenticated-orcid":false,"given":"Francesco","family":"Marchiori","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Alcaraz, C., Cumplido, J., Trivino, A.: OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0. Int. J. Inf. Secur. 22(5), 1395\u20131421 (2023)","DOI":"10.1007\/s10207-023-00698-8"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/MNET.001.1900348","volume":"34","author":"J Antoun","year":"2020","unstructured":"Antoun, J., Kabir, M.E., Moussa, B., Atallah, R., Assi, C.: A detailed security assessment of the EV charging ecosystem. IEEE Netw. 34(3), 200\u2013207 (2020)","journal-title":"IEEE Netw."},{"issue":"11","key":"1_CR3","doi-asserted-by":"publisher","first-page":"11338","DOI":"10.1109\/TVT.2021.3116279","volume":"70","author":"PR Babu","year":"2021","unstructured":"Babu, P.R., Amin, R., Reddy, A.G., Das, A.K., Susilo, W., Park, Y.: Robust authentication protocol for dynamic charging system of electric vehicles. IEEE Trans. Veh. Technol. 70(11), 11338\u201311351 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1_CR4","unstructured":"Baker, R., Martinovic, I.: Losing the car keys: wireless PHY-layer insecurity in EV charging. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 407\u2013424. USENIX Association, Santa Clara, CA (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/baker"},{"key":"1_CR5","unstructured":"Brighente, A., Conti, M., Donadel, D., Poovendran, R., Turrin, F., Zhou, J.: Electric vehicles security and privacy: challenges, solutions, and future needs. arXiv preprint arXiv:2301.04587 (2023)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Brighente, A., Conti, M., Donadel, D., Turrin, F.: EVScout2. 0: electric vehicle profiling through charging profile. ACM Trans. Cyber-Phys. Syst. 8(2), 1\u201324 (2024)","DOI":"10.1145\/3565268"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-3-030-88418-5_31","volume-title":"Computer Security \u2013 ESORICS 2021","author":"A Brighente","year":"2021","unstructured":"Brighente, A., Conti, M., Sadaf, I.: Tell me how you re-charge, i will tell you where you drove to: electric vehicles profiling based on charging-current demand. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 651\u2013667. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_31"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.neucom.2018.03.067","volume":"307","author":"M Christ","year":"2018","unstructured":"Christ, M., Braun, N., Neuffer, J., Kempa-Liehr, A.W.: Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh \u2013 A Python package). Neurocomputing 307, 72\u201377 (2018). https:\/\/doi.org\/10.1016\/j.neucom.2018.03.067","journal-title":"Neurocomputing"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Conti, M., Donadel, D., Poovendran, R., Turrin, F.: EVExchange: a relay attack on electric vehicle charging system. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) European Symposium on Research in Computer Security, pp. 488\u2013508. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17140-6_24","DOI":"10.1007\/978-3-031-17140-6_24"},{"key":"1_CR10","unstructured":"Deloitte: Electric vehicles: setting a course for 2030 (2020). https:\/\/www2.deloitte.com\/us\/en\/insights\/focus\/future-of-mobility\/electric-vehicle-trends-2030.html"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Gangwal, A., Jain, A., Conti, M., et\u00a0al.: On the feasibility of profiling electric vehicles through charging data. In: Inaugural International Symposium on Vehicle Security & Privacy (2023)","DOI":"10.14722\/vehiclesec.2023.23021"},{"issue":"3","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3524454","volume":"6","author":"M Ghafouri","year":"2022","unstructured":"Ghafouri, M., Kabir, E., Moussa, B., Assi, C.: Coordinated charging and discharging of electric vehicles: a new class of switching attacks. ACM Trans. Cyber-Phys. Syst. (TCPS) 6(3), 1\u201326 (2022)","journal-title":"ACM Trans. Cyber-Phys. Syst. (TCPS)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Gottumukkala, R., Merchant, R., Tauzin, A., Leon, K., Roche, A., Darby, P.: Cyber-physical system security of vehicle charging stations. In: 2019 IEEE Green Technologies Conference(GreenTech), pp.\u00a01\u20135 (2019)","DOI":"10.1109\/GreenTech.2019.8767141"},{"key":"1_CR14","unstructured":"He, H., et\u00a0al.: EVBattery: a large-scale electric vehicle dataset for battery health and capacity estimation. arXiv preprint arXiv:2201.12358 (2022)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"128069","DOI":"10.1109\/ACCESS.2021.3112189","volume":"9","author":"MR Khalid","year":"2021","unstructured":"Khalid, M.R., Khan, I.A., Hameed, S., Asghar, M., Ro, J.: A comprehensive review on structural topologies, power levels, energy storage systems, and standards for electric vehicle charging stations and their impacts on grid. IEEE Access 9, 128069\u2013128094 (2021)","journal-title":"IEEE Access"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Khan, O.G.M., El-Saadany, E., Youssef, A., Shaaban, M.: Impact of electric vehicles botnets on the power grid. In: 2019 IEEE Electrical Power and Energy Conference (EPEC), pp.\u00a01\u20135. IEEE (2019)","DOI":"10.1109\/EPEC47565.2019.9074822"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Lee, Z.J., Johansson, D., Low, S.H.: ACN-Sim: an open-source simulator for data-driven electric vehicle charging research. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, pp. 411\u2013412 (2019). https:\/\/doi.org\/10.1109\/SmartGridComm.2019.8909765","DOI":"10.1109\/SmartGridComm.2019.8909765"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Lee, Z.J., Li, T., Low, S.H.: ACN-Data: analysis and applications of an open EV charging dataset. In: Proceedings of the Tenth ACM International Conference on Future Energy Systems, pp. 139\u2013149. e-Energy 2019, Association for Computing Machinery, New York, NY, USA (2019)","DOI":"10.1145\/3307772.3328313"},{"issue":"5","key":"1_CR19","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1109\/TSG.2016.2522379","volume":"8","author":"H Li","year":"2016","unstructured":"Li, H., D\u00e1n, G., Nahrstedt, K.: Portunes+: privacy-preserving fast authentication for dynamic electric vehicle charging. IEEE Trans. Smart Grid 8(5), 2305\u20132313 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"1_CR20","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30, pp. 4765\u20134774. Curran Associates, Inc. (2017). http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Marchiori, F., Conti, M.: Your battery is a blast! Safeguarding against counterfeit batteries with authentication. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 105\u2013119 (2023)","DOI":"10.1145\/3576915.3623179"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Marchiori, F., Conti, M.: Leaky batteries: a novel set of side-channel attacks on electric vehicles. arXiv preprint arXiv:2503.08956 (2025)","DOI":"10.1007\/978-3-032-00624-0_16"},{"key":"1_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109512","volume":"119","author":"S Mookherji","year":"2024","unstructured":"Mookherji, S., Odelu, V., Prasath, R.: Secure ultra fast authentication protocol for electric vehicle charging. Comput. Electr. Eng. 119, 109512 (2024)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.3390\/en16031113","volume":"16","author":"Z Muhammad","year":"2023","unstructured":"Muhammad, Z., Anwar, Z., Saleem, B., Shahid, J.: Emerging cybersecurity and privacy threats to electric vehicles and their impact on human and environmental sustainability. Energies 16(3), 1113 (2023)","journal-title":"Energies"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"M\u00fcltin, M.: ISO 15118 as the enabler of vehicle-to-grid applications. In: 2018 International Conference of Electrical and Electronic Technologies for Automotive, pp.\u00a01\u20136 (2018)","DOI":"10.23919\/EETA.2018.8493213"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Nasr, T., Torabi, S., Bou-Harb, E., Fachkha, C., Assi, C.: ChargePrint: a framework for internet-scale discovery and security analysis of EV charging management systems. In: NDSS (2023)","DOI":"10.14722\/ndss.2023.23084"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Shen, W., Vo, T.T., Kapoor, A.: Charging algorithms of lithium-ion batteries: an overview. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1567\u20131572. IEEE (2012)","DOI":"10.1109\/ICIEA.2012.6360973"},{"key":"1_CR28","unstructured":"ThunderSky: Instruction manual for LFP\/LCP\/LMP lithium power battery. Tech. rep., Thunder Sky (2007)"},{"key":"1_CR29","unstructured":"United states secret service: ATM & POS skimming (2024). https:\/\/www.secretservice.gov\/investigations\/skimming"},{"issue":"1","key":"1_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s42162-022-00190-y","volume":"5","author":"A Unterweger","year":"2022","unstructured":"Unterweger, A., Knirsch, F., Engel, D., Musikhina, D., Alyousef, A., de Meer, H.: An analysis of privacy preservation in electric vehicle charging. Energy Inf. 5(1), 3 (2022)","journal-title":"Energy Inf."},{"issue":"4","key":"1_CR31","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1109\/JESTPE.2020.3045667","volume":"9","author":"J Ye","year":"2020","unstructured":"Ye, J., et al.: Cyber-physical security of powertrain systems in modern electric vehicles: vulnerabilities, challenges, and future visions. IEEE J. Emerg. Sel. Top. Power Electron. 9(4), 4639\u20134657 (2020)","journal-title":"IEEE J. Emerg. Sel. Top. Power Electron."},{"issue":"2","key":"1_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MNET.2016.7437026","volume":"30","author":"H Zhang","year":"2016","unstructured":"Zhang, H., Shu, Y., Cheng, P., Chen, J.: Privacy and performance trade-off in cyber-physical systems. IEEE Network 30(2), 62\u201366 (2016)","journal-title":"IEEE Network"},{"issue":"1","key":"1_CR33","doi-asserted-by":"publisher","first-page":"5940","DOI":"10.1038\/s41467-023-41226-5","volume":"14","author":"J Zhang","year":"2023","unstructured":"Zhang, J., et al.: Realistic fault detection of LI-ION battery via dynamical deep learning. Nat. Commun. 14(1), 5940 (2023)","journal-title":"Nat. Commun."}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00630-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:26:01Z","timestamp":1757359561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00630-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006295","9783032006301"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00630-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}