{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:46:49Z","timestamp":1751521609520,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/aqtr55203.2022.9802024","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T19:38:13Z","timestamp":1656013093000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition"],"prefix":"10.1109","author":[{"given":"Alfred","family":"Anistoroaei","sequence":"first","affiliation":[{"name":"Politehnica University of Timisoara,Faculty of Automatics and Computers,Romania"}]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[{"name":"Politehnica University of Timisoara,Faculty of Automatics and Computers,Romania"}]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[{"name":"Politehnica University of Timisoara,Faculty of Automatics and Computers,Romania"}]},{"given":"Horatiu","family":"Gurban","sequence":"additional","affiliation":[{"name":"Politehnica University of Timisoara,Faculty of Automatics and Computers,Romania"}]}],"member":"263","reference":[{"key":"ref10","article-title":"How to hack your mini cooper: reverse engineering can messages on passenger automobiles","author":"staggs","year":"2013","journal-title":"Institute for Information Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2017.8314877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00081"},{"key":"ref13","article-title":"Efficient reverse engineering of automotive firmware","author":"milburn","year":"2018","journal-title":"escar USA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00094"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.274"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2008.4640857"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE.2017.8000938"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2017.8249425"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/526180"},{"year":"0","key":"ref27","article-title":"Can bus gaming simulator"},{"key":"ref3","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00015"},{"journal-title":"Understanding automotive electronics an engineering perspective","year":"2017","author":"ribbens","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00070"},{"key":"ref7","article-title":"Automated reverse engineering and fuzzing of the can bus","author":"werquin","year":"2019","journal-title":"KU Leuven"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.62915\/2472-2707.1045","article-title":"Car hacking: Accessing and exploiting the can bus protocol","volume":"2019","author":"payne","year":"2019","journal-title":"Journal of Cybersecurity Education Research and Practice"},{"key":"ref1","first-page":"2021","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2990954"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870695"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892961"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00068"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3055378.3055382"},{"year":"0","key":"ref26","article-title":"Forum page 2 for cluster pinout"},{"year":"0","key":"ref25","article-title":"Forum page 1 for cluster pinout"}],"event":{"name":"2022 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)","start":{"date-parts":[[2022,5,19]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9801904\/9801909\/09802024.pdf?arnumber=9802024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T17:24:06Z","timestamp":1727457846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9802024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/aqtr55203.2022.9802024","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}