{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:16:21Z","timestamp":1773843381798,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361381","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0690-0697","source":"Crossref","is-referenced-by-count":6,"title":["User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN"],"prefix":"10.1109","author":[{"given":"Be\u00e1ta","family":"Stingelov\u00e1","sequence":"first","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Clemens Thadd\u00e4us","family":"Thrakl","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Laura","family":"Wro\u0144ska","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Sandra","family":"Jedrej-Szymankiewicz","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Sajjad","family":"Khan","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Davor","family":"Svetinovic","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3090354.3090412"},{"key":"ref2","volume-title":"Threat modelling for future vehicles: on identifying and analysing threats for future autonomous and connected vehicles","author":"Winsen","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300048"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-22929-0_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3250235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NEXTCOMP.2019.8883642"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.11.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJATM.2018.092187"},{"key":"ref9","first-page":"1","article-title":"Adapting threat modeling methods for the automotive industry","volume-title":"Proceedings of the 15th ESCAR Conference","author":"Karahasanovic","year":"2017"},{"key":"ref10","volume-title":"strategy digital auto report 2021","author":"Pwc","year":"2021"},{"issue":"91","key":"ref11","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref12","first-page":"1","article-title":"Free-fall: Hacking tesla from wireless to can bus","volume":"25","author":"Nie","year":"2017","journal-title":"Briefing, Black Hat USA"},{"key":"ref13","first-page":"1","article-title":"Over-the-air: How we remotely compromised the gateway, bcm, and autopilot ecus of tesla cars","author":"Nie","year":"2018","journal-title":"Briefing, Black Hat USA"},{"key":"ref14","first-page":"39","article-title":"0-days & mitigations: roadways to exploit and secure connected bmw cars","volume":"2019","author":"Cai","year":"2019","journal-title":"Black Hat USA"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s42154-021-00140-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3243906"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1263820"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0011998800003479"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0007412104790486"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2016.139.68"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.10.117"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0153-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21231"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21252"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2018.8611900"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2867497"},{"key":"ref28","article-title":"Driving security into connected cars: threat model and recommendations","author":"Huq","year":"2020","journal-title":"Trend Micro"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2971482"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105837"},{"key":"ref31","volume-title":"What is asil-d?","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s19020334"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3128634"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT49044.2020.9315582"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2980137"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749459"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"ref39","volume-title":"U. of Washington. Security and privacy threat discovery cards"},{"key":"ref40","author":"Shevchenko","year":"2018","journal-title":"Threat modeling: a summary of available methods"},{"key":"ref41","article-title":"Linddun privacy threat modeling: a tutorial","author":"Wuyts","year":"2015","journal-title":"CW Reports"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2023,11,14]]},"end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361381.pdf?arnumber=10361381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:29:27Z","timestamp":1705091367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361381","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}