{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:29Z","timestamp":1775067029073,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008287","name":"Science and Technology Directorate","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008287","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130101","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"679-686","source":"Crossref","is-referenced-by-count":1,"title":["Wicked Problem, Parsimonious Solution: Securing Electric Vehicle Charging Station Software"],"prefix":"10.1109","author":[{"given":"Emma","family":"Sheppard","sequence":"first","affiliation":[{"name":"Montana State University,Bozeman,MT,USA"}]},{"given":"Zachary","family":"Wadhams","sequence":"additional","affiliation":[{"name":"Montana State University,Bozeman,MT,USA"}]},{"given":"Dalton","family":"Arford","sequence":"additional","affiliation":[{"name":"Montana State University,Bozeman,MT,USA"}]},{"given":"Clemente","family":"Izurieta","sequence":"additional","affiliation":[{"name":"Montana State University,Bozeman,MT,USA"}]},{"given":"Ann Marie","family":"Reinhold","sequence":"additional","affiliation":[{"name":"Montana State University,Bozeman,MT,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Fact sheet: President biden announces steps to drive american leadership forward on clean cars and trucks","year":"2021"},{"key":"ref2","article-title":"Executive order on catalyzing clean energy industries and jobs through federal sustainability","year":"2021"},{"key":"ref3","article-title":"California air resources board: Zero-emission vehicle program"},{"key":"ref4","article-title":"Eu ban on the sale of new petrol and diesel cars from 2035 explained: Topics: European parliament","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2172\/2283418"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.trip.2024.101072"},{"key":"ref7","article-title":"Europe needs to invest 280 billion euros in electric vehicle charging infrastructure","year":"2023"},{"key":"ref8","article-title":"Investing in america: Biden-harris administration announces $ 635 million in awards to continue expanding zero-emission ev charging and refueling infrastructure","year":"2025"},{"key":"ref9","article-title":"Securing electric vehicle supply equipment: Cybersecurity strategies for hyperconnected ecosystems","author":"Mousavi","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"ref11","article-title":"White paper of charging interface initiative e.v","author":"Sharma","year":"2024","journal-title":"CharIN"},{"key":"ref12","article-title":"Council post: The state of cybersecurity of ev charging infrastructure","author":"Caldwell"},{"key":"ref13","article-title":"Ev charging stations still riddled with cybersecurity vulnerabilities","author":"Strom"},{"key":"ref14","article-title":"Electric vehicle cyber research","volume-title":"Proceedings of the DOE FEMP Energy Exchange","author":"Rohde"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23251"},{"key":"ref16","article-title":"A distributed auto charger attack on the grid","volume-title":"Proceedings of the S4","author":"Rohde"},{"key":"ref17","article-title":"Examining log 4 mathrmj vulnerabilities in connected cars and charging stations","author":"Dudek","journal-title":"Trend Micro"},{"key":"ref18","article-title":"Securely connecting electric vehicles to the smart grid","volume":"6","author":"Falk","year":"2013","journal-title":"Intl Journal on Advances in Internet Technology"},{"key":"ref19","first-page":"58","article-title":"Electric vehicle charging infrastructure security considerations and approaches","volume-title":"Proceedings of INTERNET","author":"Falk"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0342-y"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2014.7021815"},{"key":"ref22","first-page":"27","article-title":"Ladeinfrastruktur f\u00fcr elektroautos: Ausbau statt sicherheit (charging infrastructure for electric cars: Expansion instead of security)","volume-title":"Proceedings of the 34th Chaos Communication Congress","author":"Dalheimer"},{"key":"ref23","article-title":"Security and privacy in the current e-mobility charging infrastructure","volume-title":"Proc. of the DeepSec","volume":"31","author":"Friedland"},{"key":"ref24","article-title":"Cyber security research and development: Cyber assessment report of level 2 ac powered electric vehicle supply equipment","volume-title":"INL, Tech. Rep","year":"2018"},{"key":"ref25","article-title":"What is plug & charge?","author":"Sorokanich","year":"2023","journal-title":"Capital One Auto Navigator"},{"key":"ref26","article-title":"Open charge point protocol","author":"Alliance"},{"key":"ref27","article-title":"Hijacking ev charge points to cause dos","author":"Saposnik","year":"2023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2669647"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328675"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84614-5_13"},{"key":"ref31","first-page":"10","article-title":"Who can hack a plug? the infosec risks of charging electric cars","volume-title":"Proceedings of the Hack in the Box","author":"Shezaf"},{"key":"ref32","article-title":"Vulnerabilities could let hackers remotely shut down ev chargers, steal electricity","author":"Vasquez","year":"2023"},{"key":"ref33","first-page":"21","article-title":"Securing vehicle charging infrastructure","volume-title":"Proceedings of the 2021 DOE Vehicle Technologies Office Annual Merit Review","author":"Anderson"},{"key":"ref34","article-title":"Security of ev & back-end systems (evse)","author":"Master","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102511"},{"key":"ref36","article-title":"Schneider electric security notification: Evlink city\/parking\/smart wallbox charging stations","year":"2021"},{"key":"ref37","article-title":"Shifting the balance of cybersecurity risk: Principles and approaches for security-by-design and-default","journal-title":"Cybersecurity and Infrastructure Security Agency"},{"key":"ref38","article-title":"Software quality assurance-software engineering","journal-title":"GeeksforGeeks"},{"key":"ref39","article-title":"Cisa: 2023-2027 strategic technology roadmap","journal-title":"Cybersecurity and Infrastructure Security Agency"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2357"},{"key":"ref41","article-title":"Automotive spice ver. 3.1, process assessment model","year":"2017","journal-title":"VDA QMC Working Group. 13 \/ Automotive SIG"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.02.009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.05.060"},{"issue":"1","key":"ref44","article-title":"Surmounting challenges in aggregating results from static analysis tools","volume":"7","author":"Reinhold","year":"2024","journal-title":"Military Cyber Affairs"},{"key":"ref45","article-title":"Consequence-driven cybersecurity for highpower charging infrastructure","volume-title":"DOE Vehicle Technologies Program, Tech. Rep. INL\/MIS-19-53414","author":"Carlson","year":"2017"},{"key":"ref46","article-title":"Isa\/iec 62443 series of standards-isa","journal-title":"International Society of Automation"},{"key":"ref47","article-title":"Iso\/sae21434: Road vehicles-cybersecurity engineering","year":"2021","journal-title":"Society for Automotive Engineering International"},{"key":"ref48","article-title":"Government fleet and public sector electric vehicle supply equipment (evse) cybersecurity best practices and procurement language report","author":"Harnett","year":"2019"},{"key":"ref49","article-title":"Ieee 1547.3-2023: Ieee guide for cybersecurity of distributed energy resources interconnected with electric power systems","journal-title":"IEEE Standards Association"},{"key":"ref50","article-title":"Upstream security global automotive cybersecurity report 2024","volume-title":"Upstream Security Ltd","year":"2024"},{"key":"ref51","article-title":"Iso\/iec 25010:2023 systems and software engineering-systems and software quality requirements and evaluation (square) product quality model","journal-title":"International Standards Organization"},{"key":"ref52","article-title":"From bugs to breaches: The software quality problem in security","journal-title":"Aptori"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2018.8471951"},{"key":"ref54","article-title":"Tesla\u2019s ev plug is closer to becoming the industry standard following a move by an automotive group","author":"Krisher","journal-title":"AP News"},{"key":"ref55","article-title":"Sae j3400 charging connector. joint office of energy and transportation","journal-title":"Joint Office of Energy and Transportation"},{"key":"ref56","article-title":"Ev charging systems security requirements","year":"2017"},{"key":"ref57","article-title":"Medium and heavy duty electric vehicle and charging infrastructure cyber security baseline reference document","year":"2018"},{"key":"ref58","article-title":"Microsoft threat modeling tool threats","year":"2022"},{"key":"ref59","article-title":"Uncover security design flaws using the stride approach","year":"2006"},{"key":"ref60","article-title":"Cyber security evaluation tool (cset): Cisa","year":"2025"},{"key":"ref61","article-title":"About electrify america"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130101.pdf?arnumber=11130101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:51:00Z","timestamp":1756270260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130101","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}