{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:52:32Z","timestamp":1742993552789,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459301"},{"type":"electronic","value":"9783319459318"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45931-8_18","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T07:26:19Z","timestamp":1474010779000},"page":"262-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Combining Third Party Components Securely in Automotive Systems"],"prefix":"10.1007","author":[{"given":"Madeline","family":"Cheah","sequence":"first","affiliation":[]},{"given":"Siraj A.","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Bryans","sequence":"additional","affiliation":[]},{"given":"Hoang Nga","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"key":"18_CR1","unstructured":"Bluetooth SIG Inc.: Bluetooth Specification: File Transfer Profile (FTP) (2012)"},{"key":"18_CR2","unstructured":"Chang, R., Shmatikov, V.: Formal analysis of authentication in bluetooth device pairing. In: Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, p. 45. Wroclaw, Poland (2007)"},{"key":"18_CR3","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of 20th USENIX Security Symp. pp. 77\u201392. USENIX Assoc., San Francisco, August 2011"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2010.3","volume":"8","author":"JP Dunning","year":"2010","unstructured":"Dunning, J.P.: Taming the blue beast: a survey of bluetooth based threats. IEEE Secur. Priv. 8(2), 20\u201327 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"18_CR5","unstructured":"EVITA Project: Deliverable D2.3 - Security requirements for automotive on-board networks based on dark-side scenarios. Technical report (2009)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-17245-8_4","volume-title":"Architecting Dependable Systems VII","author":"A Fuchs","year":"2010","unstructured":"Fuchs, A., Rieke, R.: Identification of security requirements in systems of systems by functional security analysis. In: Lemos, R., Gacek, C., Casimiro, A. (eds.) Architecting Dependable Systems VII. LNCS, vol. 6420, pp. 74\u201396. Springer, Heidelberg (2010)"},{"key":"18_CR7","unstructured":"Gordon, D., Stehney, T., Wattas, N., Yu, E.: System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System. Techniacl report Carnegie Mellon University, Pittsburgh, May 2005"},{"key":"18_CR8","unstructured":"GSMA: Connected Car Forecast: Global Connected Car Market to Grow Threefold within Five Years. Technical report, GSMA (2013). \n                      http:\/\/www.gsma.com\/connectedliving\/wp-content\/uploads\/2013\/06\/cl_ma_forecast_06_13.pdf"},{"key":"18_CR9","unstructured":"Idrees, M.S., Roudier, Y., Apvrille, L.: A framework towards the efficient identification and modeling of security requirements. In: Proceedings of the 5th Conference on Network Architecture and Information Systems, pp. 1\u201315. Menton, France, May 2010"},{"key":"18_CR10","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of 26th International Conference on Software Engineering, p. 10. IEEE Computer Society, Edinburgh, May 2004"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Liu, B., Shi, L., Cai, Z., Li, M.: Software vulnerability discovery techniques: a survey. In: Proceedings of the 4th International Conference on Multimedia Information Networking and Security. IEEE, Nanjing, China (2012)","DOI":"10.1109\/MINES.2012.202"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"issue":"11","key":"18_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1353-4858(02)11009-9","volume":"2002","author":"P Midian","year":"2002","unstructured":"Midian, P.: Perspectives on penetration testing - Black box vs. white box. Netw. Secur. 2002(11), 10\u201312 (2002)","journal-title":"Netw. Secur."},{"key":"18_CR14","unstructured":"National Institute of Standards and Technology: National Vulnerability Database"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Oka, D.K., Furue, T., Langenhop, L., Nishimura, T.: Survey of vehicle iot bluetooth devices. In: Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 260\u2013264. IEEE, Matsue, Japan, November 2014","DOI":"10.1109\/SOCA.2014.20"},{"issue":"5","key":"18_CR16","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"AL Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51(5), 916\u2013932 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"18_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-258-0","volume-title":"Understanding Concurrent Systems","author":"A Roscoe","year":"2010","unstructured":"Roscoe, A.: Understanding Concurrent Systems, 1st edn. Springer, London (2010)","edition":"1"},{"key":"18_CR18","unstructured":"SAE International: J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (2016). \n                      http:\/\/standards.sae.org\/j3061_201601\/"},{"key":"18_CR19","unstructured":"Schneier, B.: Attack trees: modeling security threats (1999). \n                      http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45931-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:25:16Z","timestamp":1600475116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45931-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459301","9783319459318"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45931-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}