{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090853,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_15","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:09Z","timestamp":1749846189000},"page":"285-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of\u00a0Automotive Attack Feasibility Methods in\u00a0Comparison to\u00a0Railway and\u00a0Aviation Methods"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5973-1667","authenticated-orcid":false,"given":"Johannes","family":"von Richthofen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7574","authenticated-orcid":false,"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9052-9627","authenticated-orcid":false,"given":"Johann","family":"Altgenug","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2052-2354","authenticated-orcid":false,"given":"Dominik","family":"Spychalski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1013-7284","authenticated-orcid":false,"given":"Wolfgang","family":"Hommel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"15_CR1","unstructured":"archlinux: ConnMan (2018). https:\/\/wiki.archlinux.org\/title\/ConnMan"},{"key":"15_CR2","unstructured":"AUTOSAR: Specification of Secure Onboard Communication (2023). https:\/\/www.autosar.org\/fileadmin\/standards\/R23-11\/CP\/AUTOSAR_CP_SWS_SecureOnboardCommunication.pdf"},{"key":"15_CR3","unstructured":"CENELEC: CLC\/TS 50701 Railway applications - Cybersecurity (2021). https:\/\/www.en-standard.eu\/clc\/ts-50701-2021-railway-applications-cybersecurity\/"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Csikor, L., Lim, H.W., Wong, J.W., Ramesh, S., Parameswarath, R.P., Chan, M.C.: RollBack: a new time-agnostic replay attack against the automotive remote keyless entry systems. ACM Trans. Cyber-Phys. Syst. 8(1) (2024). https:\/\/doi.org\/10.1145\/3627827","DOI":"10.1145\/3627827"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Eurostat: Key Figures on European Transport 2023 Edition (2023). https:\/\/doi.org\/10.2785\/4866. https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Archive:Passenger_transport_statistics#Air_passengers","DOI":"10.2785\/4866"},{"key":"15_CR6","unstructured":"FIRST: CVSS 3.1 (2019). https:\/\/www.first.org\/cvss\/"},{"key":"15_CR7","unstructured":"Gayou, S.: Jailbreaking Subaru StarLink (2020). https:\/\/github.com\/sgayou\/subaru-starlink-research\/blob\/master\/doc\/README.md#introduction"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOMSTD.0001.2100080","volume":"6","author":"C Gianpiero","year":"2022","unstructured":"Gianpiero, C., Marco, D.V., Ilaria, M.: In-depth exploration of ISO\/SAE 21434 and its correlations with existing standards. IEEE Commun. Stand. Mag. 6(1), 84\u201392 (2022). https:\/\/doi.org\/10.1109\/MCOMSTD.0001.2100080","journal-title":"IEEE Commun. Stand. Mag."},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Greiner, S., Massierer, M., Loderhose, C., Lutz, B., Stumpf, F., Wiemer, F.: A supplier\u2019s perspective on threat analysis and risk assessment according to ISO\/SAE 21434. In: 20th ESCAR Europe - The World\u2019s Leading Automotive Cyber Security Conference (15. - 16.11.2022). Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsbibliothek, Berlin (2022). https:\/\/doi.org\/10.13154\/294-9357","DOI":"10.13154\/294-9357"},{"key":"15_CR10","unstructured":"ISO\/IEC: ISO\/IEC 18045 - Information technology \u2013 Security techniques \u2013 Methodology for IT security evaluation (2014). https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:18045:ed-3:v1:en"},{"key":"15_CR11","unstructured":"ISO\/SAE: ISO\/SAE 21434:2021 Road vehicles - Cybersecurity engineering (2021). https:\/\/www.iso.org\/standard\/70918.html"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Kamkar, S.: Drive it like you Hacked it: New Attacks and Tools to Wireles. DEF CON (2015). https:\/\/doi.org\/10.5446\/36433","DOI":"10.5446\/36433"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"K\u00f6hler, S., Baker, R., Strohmeier, M., Martinovic, I.: Brokenwire: Wireless Disruption of CCS Electric Vehicle Charging (2022)","DOI":"10.14722\/ndss.2023.23251"},{"key":"15_CR14","unstructured":"Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passanger Vehicle (2015). https:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf"},{"key":"15_CR15","unstructured":"NIST: CVE-2015-5611 (2016). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-5611"},{"key":"15_CR16","unstructured":"NIST: CVE-2016-4546 (2017). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4546"},{"key":"15_CR17","unstructured":"NIST: CVE-2018-18203 (2019). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-18203"},{"key":"15_CR18","unstructured":"NIST: CVE-2021-26675 (2022). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26675"},{"key":"15_CR19","unstructured":"NIST: CVE-2022-08783 (2022). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-08783"},{"key":"15_CR20","unstructured":"NIST: CVE-2022-37418 (2022). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-37418"},{"key":"15_CR21","unstructured":"NIST: CVE-2018-7935 (2023). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-7935"},{"key":"15_CR22","unstructured":"NIST: CVE-2023-20589 (2023). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20589"},{"key":"15_CR23","unstructured":"NIST: CVE-2023-29389 (2023). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-29389"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Plappert, C., Zelle, D., Gadacz, H., Rieke, R., Scheuermann, D., Krau\u00df, C.: Attack surface assessment for cybersecurity engineering in the automotive domain. In: 2021 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Valladolid, Spain, pp. 266\u2013275. IEEE (2021). https:\/\/doi.org\/10.1109\/PDP52278.2021.00050","DOI":"10.1109\/PDP52278.2021.00050"},{"key":"15_CR25","unstructured":"Powley, S.: Comparative evaluation of cybersecurity methods for attack feasibility rating per ISO\/SAE dis 21434 (2020). https:\/\/www.researchgate.net\/publication\/339390034_Comparative_Evaluation_of_Cybersecurity_Methods_for_Attack_Feasibility_Rating_per_ISOSAE_DIS_21434"},{"key":"15_CR26","unstructured":"RTCA: RTCA DO-326A Airworthiness Security Process Specification (2014). https:\/\/my.rtca.org\/productdetails?id=a1B36000001IcfuEAC"},{"key":"15_CR27","unstructured":"RTCA: RTCA DO-356A Airworthiness Security Methods and Considerations (2018). https:\/\/my.rtca.org\/productdetails?id=a1B36000006xdusEAA"},{"key":"15_CR28","unstructured":"SAE International: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (2021). https:\/\/www.sae.org\/standards\/content\/j3061_202112\/#:~:text=Cybersecurity%20Guidebook%20for%20Cyber%2DPhysical%20Vehicle%20Systems(STABILIZED%20Dec%202021,industry%2C%20government%20and%20conference%20papers"},{"key":"15_CR29","unstructured":"Tindell, K., Tabor, I.: CAN Injection: keyless car theft (2022). https:\/\/kentindell.github.io\/2023\/04\/03\/can-injection\/"},{"key":"15_CR30","unstructured":"Tong, L., Luhai, C.: Common Attacks Against Car Infotainment Systems (2019). https:\/\/events19.linuxfoundation.org\/wp-content\/uploads\/2018\/07\/ALS19-Common-Attacks-Against-Car-Infotainment-Systems.pdf"},{"key":"15_CR31","unstructured":"United Nations: UN Regulation No. 155 - Cyber security and cyber security management system (2021). https:\/\/unece.org\/transport\/documents\/2021\/03\/standards\/un-regulation-no-155-cyber-security-and-cyber-security"},{"key":"15_CR32","unstructured":"Weinmann, R.P., Schmotzle, B.: TBONE - A zero-click exploit for Tesla MCUs (2020). https:\/\/www.youtube.com\/watch?v=krSj81thN0w"},{"key":"15_CR33","unstructured":"Werling, C., K\u00fchnapfel, N., Jacob, H.N., Drokin, O.: Jailbreaking an Electric Vehicle in 2023 (2023). https:\/\/www.blackhat.com\/us-23\/briefings\/schedule\/#jailbreaking-an-electric-vehicle-in--or-what-it-means-to-hotwire-teslas-x-based-seat-heater-33049"},{"key":"15_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104461","volume":"90","author":"D Zelle","year":"2022","unstructured":"Zelle, D., Plappert, C., Rieke, R., Scheuermann, D., Krau\u00df, C.: ThreatSurf: a method for automated threat surface assessment in automotive cybersecurity engineering. Microprocess. Microsyst. 90, 104461 (2022). https:\/\/doi.org\/10.1016\/j.micpro.2022.104461","journal-title":"Microprocess. Microsyst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:19Z","timestamp":1749846199000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}