{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:30Z","timestamp":1740102270792,"version":"3.37.3"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100003077","name":"Knowledge Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003077","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/etfa54631.2023.10275402","type":"proceedings-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T17:38:14Z","timestamp":1697132294000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Towards a holistic approach to security validation of construction machinery through HIL systems"],"prefix":"10.1109","author":[{"given":"Sheela","family":"Hariharan","sequence":"first","affiliation":[{"name":"Volvo Construction Equipment,Eskilstuna,Sweden"}]},{"given":"Andreas","family":"Ers\u00e9us","sequence":"additional","affiliation":[{"name":"Volvo Construction Equipment,Eskilstuna,Sweden"}]},{"given":"Thomas","family":"Nolte","sequence":"additional","affiliation":[{"name":"M&#x00E4;lardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Alessandro V.","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"M&#x00E4;lardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAKM50778.2021.9357733"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4271\/2022-01-0117"},{"journal-title":"Itemis security analyst Threat and risk assessment tool","year":"0","key":"ref12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT48044.2019.9637090"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100468"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00122"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340329"},{"key":"ref36","first-page":"67","author":"jost","year":"2016","journal-title":"Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615"},{"journal-title":"European Commission","year":"0","key":"ref11"},{"key":"ref33","first-page":"1","article-title":"A process to facilitate automated automotive cyber-security testing","author":"stefan","year":"2021","journal-title":"Vehicular Technology Conference (VTC Spring)"},{"journal-title":"Regulation of the European Parliament and of the Council on Machinery Products","year":"0","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00021"},{"key":"ref2","article-title":"Upstream&#x2019;s 2023 global automotive cybersecurity report","author":"security","year":"2023","journal-title":"Tech Rep"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3151712"},{"journal-title":"KALI Linux","year":"2014","key":"ref17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.58"},{"journal-title":"Socketcan utilities","year":"2020","key":"ref16"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00016"},{"journal-title":"Canfuzzing and analysis tool","year":"2018","key":"ref19"},{"journal-title":"wireshark and usbcap","year":"2018","key":"ref18"},{"key":"ref24","first-page":"1","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"Workshop on Embedded Security in Cars"},{"journal-title":"The Car Hacker&#x2019;s Handbook A Guide for the Penetration Tester","year":"2016","author":"smith","key":"ref46"},{"key":"ref23","first-page":"94","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.62"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"ref25","first-page":"2021","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"journal-title":"Hypervisor","year":"2014","key":"ref47"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.80.1"},{"journal-title":"National Vulnerability Database","year":"0","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE45908.2019.8965092"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3112538"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3360664.3362698"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340329"},{"journal-title":"ISO 19014 Edition 1 - Earth-moving machinery &#x2013; Functional safety","year":"0","key":"ref43"},{"journal-title":"Creating a European SCADA Security Testbed","year":"2008","author":"christiansson","key":"ref28"},{"key":"ref27","first-page":"58","article-title":"Electric vehicle charging infrastructure security considerations and approaches","author":"falk","year":"2012","journal-title":"Proc of INTERNET"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.82"},{"journal-title":"R155","year":"0","key":"ref8"},{"journal-title":"ISO\/SAE 21434 Road Vehicles &#x2013; Cybersecurity Engineering","year":"0","key":"ref7"},{"journal-title":"R156","year":"0","key":"ref9"},{"journal-title":"Cybersecurity for Commercial Vehicles","year":"2018","author":"d\u2019anna","key":"ref4"},{"key":"ref3","article-title":"Truck hacking: An experimental analysis of the SAE J1939 standard","author":"burakova","year":"2016","journal-title":"USENIX Workshop on Offensive Technologies (WOOT)"},{"journal-title":"J3061 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4271\/2020-01-0145"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2018.00043"}],"event":{"name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2023,9,12]]},"location":"Sinaia, Romania","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275065\/10275329\/10275402.pdf?arnumber=10275402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:44:42Z","timestamp":1698691482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/etfa54631.2023.10275402","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}