{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:33:27Z","timestamp":1743129207284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319224244"},{"type":"electronic","value":"9783319224251"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22425-1_18","type":"book-chapter","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T14:42:31Z","timestamp":1439995351000},"page":"301-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks"],"prefix":"10.1007","author":[{"given":"Takaya","family":"Ezaki","sequence":"first","affiliation":[]},{"given":"Tomohiro","family":"Date","sequence":"additional","affiliation":[]},{"given":"Hiroyuki","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"key":"18_CR1","unstructured":"McCarthy, C., Harnett, K., Carter, A.: Characterization of potential security threats in modern automobiles. Report No. DOT HS 812 074, National Highway Traffic Safety Administration, U.S. Department of Transportation, October 2014"},{"key":"18_CR2","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, pp. 77\u201392, August 2011"},{"key":"18_CR3","unstructured":"International Organization for Standardization: Road vehicles, controller area network (CAN), Part 1: Data link layer and physical signaling. ISO IS11898-1 (2003)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: Intelligent Vehicles Symposium (IV), pp. 528\u2013533, June 2011","DOI":"10.1109\/IVS.2011.5940525"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.: Framework for security and privacy in automotive telematics. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC 2002), pp. 25\u201332, September 2002","DOI":"10.1145\/570705.570711"},{"key":"18_CR6","isbn-type":"print","volume-title":"Embedded Security in Cars: Securing Current and Future Automotive IT Applications","author":"K Lemke","year":"2005","unstructured":"Lemke, K., Paar, C., Wolf, M.: Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, Heidelberg (2005). ISBN 978-3540283843","ISBN":"https:\/\/id.crossref.org\/isbn\/9783540283843"},{"key":"18_CR7","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Proceedings of the Workshop on Embedded Security in Cars (ESCAR 2004) (2004)"},{"key":"18_CR8","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, August 2011"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Ka\u00e2niche, M., Laarouchi, Y.: Survey on security threats and protection mechanisms in embedded automotive networks. In: The 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks (DSN 2013), pp. 1\u201312, June 2013","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462, May 2010","DOI":"10.1109\/SP.2010.34"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"T Hoppe","year":"2008","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive can networks \u2013 practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235\u2013248. Springer, Heidelberg (2008)"},{"key":"18_CR12","unstructured":"Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In: 9th Embedded Security in Cars Conference, September 2011"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012)"},{"key":"18_CR14","unstructured":"Oka, D.K., Furue, T., Bayer, S., Vuillaume, C.: Analysis of performing secure remote vehicle diagnostics. In: Computer Security Symposium (CSS 2014), pp. 643\u2013650, October 2014"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-642-31912-9_20","volume-title":"Information Security and Cryptology - ICISC 2011","author":"M Wolf","year":"2012","unstructured":"Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 302\u2013318. Springer, Heidelberg (2012)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Schweppe, H., Roudier, Y.: Security and privacy for in-vehicle networks. In: 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC), pp. 12\u201317. IEEE, June 2012","DOI":"10.1109\/VCSC.2012.6281235"},{"key":"18_CR17","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-642-29673-4_8","volume-title":"Advanced Microsystems for Automotive Applications 2012","author":"P Hank","year":"2012","unstructured":"Hank, P., Suermann, T., M\u00fcller, S.: Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard. In: Meyer, G. (ed.) Advanced Microsystems for Automotive Applications 2012, pp. 79\u201389. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22425-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:30:54Z","timestamp":1676471454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22425-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319224244","9783319224251"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22425-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}