{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T19:17:18Z","timestamp":1762543038529,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003565","name":"Ministry of Land, Infrastructure and Transport","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003565","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007694","name":"Korea Agency for Infrastructure Technology Advancement","doi-asserted-by":"publisher","award":["18TLRP-B117133-03"],"award-info":[{"award-number":["18TLRP-B117133-03"]}],"id":[{"id":"10.13039\/501100007694","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2910865","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T20:40:43Z","timestamp":1556224843000},"page":"49738-49755","source":"Crossref","is-referenced-by-count":21,"title":["T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2505-8797","authenticated-orcid":false,"given":"Seungho","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wonsuk","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hyo Jin","family":"Jo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0692-2543","authenticated-orcid":false,"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ARM Cortex-A53 MPCore Processor","first-page":"1","year":"2015","key":"ref39"},{"journal-title":"Security technology building a secure system using trustzone technology (white paper)","year":"2009","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50500-8_7"},{"key":"ref32","first-page":"1","article-title":"Automotive ethernet network requirements","author":"kim","year":"2011","journal-title":"Proc IEEE 802 1 AVB Task Force Meet"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849725"},{"key":"ref37","first-page":"1","volume":"1","author":"johnson","year":"2016","journal-title":"Intel Software Guard Extensions EPID Provisioning and Attestation Services"},{"key":"ref36","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint"},{"journal-title":"Intel Software Guard Extensions Programming Reference","year":"2014","key":"ref35"},{"journal-title":"Intel software guard extensions developer guide","year":"2017","key":"ref34"},{"journal-title":"How A Self-Driving UBER Killed a Pedestrian in Arizona","year":"2018","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6685767"},{"journal-title":"An Update on Last Week&#x2019;s Accident","year":"2018","key":"ref29"},{"journal-title":"Vehicle Mobile Communication","year":"2018","key":"ref2"},{"journal-title":"Automotive Gateway A Key Component to Securing the Connected Car","year":"2018","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240280"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2005.95756"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053034"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0164"},{"key":"ref25","first-page":"17","author":"gabler","year":"2004","journal-title":"Use of Event Data Recorder (EDR) Technology for Highway Crash Data Analysis"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref50"},{"journal-title":"A next-generation smart contract and decentralized application platform","year":"2014","author":"buterin","key":"ref51"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2608901"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812149"},{"key":"ref10","article-title":"Forward integrity for secure audit logs","volume":"184","author":"bellare","year":"1997"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_1"},{"journal-title":"Globalplatform Specification Library","year":"2018","key":"ref40"},{"key":"ref12","first-page":"53","article-title":"Cryptographic support for secure logs on untrusted machines","volume":"98","author":"schneier","year":"1998","journal-title":"Proc Usenix Security Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"ref14","article-title":"Minimizing bandwidth for remote access to cryptographically protected audit logs","author":"kelsey","year":"1999","journal-title":"Proc First Int Workshop on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref15","first-page":"203","article-title":"Logcrypt: Forward security and public verification for secure audit logs","volume":"54","author":"holt","year":"2006","journal-title":"Proc Australasian Workshop Grid Computing and e-Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368361"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1502777.1502779"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"journal-title":"Remote exploitation of an unaltered passenger vehicle","year":"2015","author":"miller","key":"ref3"},{"journal-title":"Samsung&#x2019;s Exynos Processors Selected to Revolutionize Audi&#x2019;s Next-Generation In-Vehicle Infotainment","year":"2017","key":"ref6"},{"journal-title":"Driving Into the Future With Automotive Technology","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1996.569666"},{"article-title":"Committee on national security systems (CNSS) glossary","year":"2015","author":"dukes","key":"ref7"},{"journal-title":"Limiting Execution to Certain CPUs","year":"2018","key":"ref49"},{"key":"ref9","first-page":"155","article-title":"Automatic event-stream notarization using digital signatures","author":"schneier","year":"1996","journal-title":"Proc Int Workshop Secur Protocols"},{"journal-title":"ARM Trusted Firmware","year":"0","key":"ref46"},{"journal-title":"Arm TrustZone in QEMU","year":"2014","key":"ref45"},{"journal-title":"HiKey Board Which is Available From LeMaker","year":"2018","key":"ref48"},{"journal-title":"Open portable trusted execution environment","year":"2018","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"journal-title":"The trusted execution environment Delivering enhanced security at a lower cost to the mobile market","first-page":"1","year":"2011","key":"ref41"},{"key":"ref44","first-page":"549","article-title":"Armageddon: Cache attacks on mobile devices","author":"lipp","year":"2016","journal-title":"Proc Usenix Security Symp"},{"key":"ref43","volume":"2017","author":"irazoqui","year":"2017","journal-title":"Cache Side Channel Attack Exploitability and Countermeasures"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08689029.pdf?arnumber=8689029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:10Z","timestamp":1628624410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8689029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2910865","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}