{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:14:56Z","timestamp":1770905696467,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540876977","type":"print"},{"value":"9783540876984","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_21","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T15:53:29Z","timestamp":1221839609000},"page":"235-248","source":"Crossref","is-referenced-by-count":165,"title":["Security Threats to Automotive CAN Networks \u2013 Practical Examples and Selected Short-Term Countermeasures"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Hoppe","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kiltz","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Kaspersky, E.: Viruses coming aboard?, Viruslist.com Weblog January 24, 2005 (June 2008), \n                    \n                      http:\/\/www.viruslist.com\/en\/weblog?discuss=158190454&return=1"},{"key":"21_CR2","unstructured":"Barisani,A., Daniele, B.: Unusual Car Navigation Tricks: Injecting RDS-TMC Traffic Information Signals. In: Can Sec West, Vancouver (2007)"},{"key":"21_CR3","unstructured":"Car-2-Car Communication Consortium (June 2008), \n                    \n                      http:\/\/www.car-2-car.org\/"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75101-4_4","volume-title":"Computer Safety, Reliability, and Security","author":"A. Lang","year":"2007","unstructured":"Lang, A., Dittmann, J., Kiltz, S., Hoppe, T.: Future Perspectives: The Car and its IP-Address - A Potential Safety and Security Risk Assessment. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680. Springer, Heidelberg (2007)"},{"key":"21_CR5","unstructured":"BOSCH CAN, Website (June 2008), \n                    \n                      http:\/\/www.can.bosch.com\/"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1155\/2007\/74706","volume":"2007","author":"M. Wolf","year":"2007","unstructured":"Wolf, M., Weimerskirch, A., Wollinger, T.: State of the Art: Embedding Security in Vehicles. EURASIP Journal on Embedded Systems\u00a02007, 16 (2007); Article ID 74706, 16 pages, 2007. doi:10.1155\/2007\/74706","journal-title":"EURASIP Journal on Embedded Systems"},{"key":"21_CR7","unstructured":"Press release of Ruhr-Universit\u00e4t Bochum: Remote keyless entry system for cars and buildings is hacked, may 31st, Link (2008), \n                    \n                      http:\/\/www.crypto.rub.de\/imperia\/md\/content\/projects\/keeloq\/keeloq_en.pdf"},{"key":"21_CR8","unstructured":"HIS: Herstellerinitiative Software (June 2008), \n                    \n                      http:\/\/www.automotive-his.de\/"},{"key":"21_CR9","unstructured":"Vector Informatik (June 2008), \n                    \n                      http:\/\/www.vector-informatik.com\/"},{"key":"21_CR10","unstructured":"Hoppe, T., Dittmann, J.: Sniffing\/Replay Attacks on CAN Buses: A Simulated Attack on the Electric Window Lift Classified using an Adapted CERT Taxonomy. In: 2nd Workshop on Embedded Systems Security (WESS 2007), A Workshop of the IEEE\/ACM EMSOFT 2007 and the Embedded Systems Week, October 4 (2007)"},{"key":"21_CR11","unstructured":"Hoppe, T., Kiltz, S., Lang, A., Dittmann, J.: Exemplary Automotive Attack Scenarios: Trojan horses for Electronic Throttle Control System (ETC) and replay attacks on the power window system. In: Automotive Security - VDI-Berichte 2016, 23. VDI\/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 27-28 November 2007, pp. 165\u2013183. VDI-Verlag (2007) ISBN 978-3-18-092016-0"},{"key":"21_CR12","unstructured":"Hoppe, T., Dittmann, J.: Vort\u00e4uschen von Komponentenfunktionalit\u00e4t im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. In: Sicherheit 2008; Sicherheit - Schutz und Zuverl\u00e4ssigkeit, Saarbr\u00fccken, Germany, April 2008, pp. 341\u2013353 (2008) ISBN 978-3-88579-222-2"},{"key":"21_CR13","unstructured":"FlexRay - The communication system for advanced automotive control applications (June 2008), \n                    \n                      http:\/\/www.flexray.com\/"},{"issue":"1","key":"21_CR14","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1504\/IJICS.2007.012248","volume":"1","author":"N. Stakhanova","year":"2007","unstructured":"Stakhanova, N., Basu, S., Wong, J.: A Taxonomy of Intrusion Response Systems. nternational Journal of Information and Computer Security\u00a01(1), 169\u2013184 (2007)","journal-title":"nternational Journal of Information and Computer Security"},{"key":"21_CR15","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: IDS als zuk\u00fcnftige Erg\u00e4nzung automotiver IT-Sicherheit. In: DACH Security 2008, June 24-25, 2008, Technische Universit\u00e4t Berlin (to appear, 2008)"},{"key":"21_CR16","unstructured":"Website Kienzle-Automotive, product page of the Unfalldatenspeicher UDS system (June 2008), \n                    \n                      http:\/\/kienzle-automotive.com\/index.php?108&tt_products=33"},{"key":"21_CR17","unstructured":"Jan Pelzl: Secure Hardware in Automotive Applications. In: 5th escar conference \u2013 Embedded Security in Cars, November 6.\/7, Munich, Germany (2007)"},{"key":"21_CR18","unstructured":"Trusted Computing Group (June 2008), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/"},{"key":"21_CR19","unstructured":"Bogdanov, A., Eisenbarth, T., Wolf, M., Wollinger, T.: Trusted Computing for Automotive Systems; In: Automotive Security - VDI-Berichte 2016, 23. VDI\/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 27-28 November 2007. VDI-Verlag, pp. 227-237, (2007) ISBN 978-3-18-092016-0"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:45:24Z","timestamp":1619509524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}