{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:59:32Z","timestamp":1768337972121,"version":"3.49.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/ised.2017.8303906","type":"proceedings-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T16:58:31Z","timestamp":1519923511000},"page":"1-6","source":"Crossref","is-referenced-by-count":29,"title":["Security of autonomous vehicle as a cyber-physical system"],"prefix":"10.1109","author":[{"given":"Anupam","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"proceedings of the Workshop on Embedded Security in Cars (ESCAR'06)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/329124.329126"},{"key":"ref33","first-page":"55","author":"shoukry","year":"2013","journal-title":"Non-Invasive Spoofing Attacks for Anti-Lock Braking Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref31","first-page":"1","author":"rebeiro","year":"2015","journal-title":"An Introduction to Timing Attacks"},{"key":"ref30","article-title":"Secure and lightweight compressive sensing using stream cipher","author":"pudi","year":"2017","journal-title":"IEEE Transactions on Circuits and Systems II Express Briefs"},{"key":"ref37","author":"valasek","year":"2014","journal-title":"A survey of Remote Automotive Attack Surfaces"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/34.3899"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"ref34","first-page":"1057","article-title":"CLKSCREW: Exposing the perils of security-oblivious energy management","author":"tang","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2666141.2666145"},{"key":"ref11","first-page":"37","author":"boneh","year":"1997","journal-title":"On the Importance of Checking Cryptographic Protocols for Faults"},{"key":"ref12","first-page":"1","article-title":"Remote Timing Attacks Are Practical","author":"brumley","year":"2003","journal-title":"Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12 SSYM'03"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2780172"},{"key":"ref14","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security SEC'11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858321"},{"key":"ref16","article-title":"Green Lights Forever: Analyzing the Security of Traffic Infrastructure","author":"ghena","year":"2014","journal-title":"Proceedings of the 8th USENIX conference on Offensive Technologies"},{"key":"ref17","first-page":"12","author":"gollmann","year":"2013","journal-title":"Security in Cyber- Physical Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5624989"},{"key":"ref19","article-title":"Threshold Implementations of GIFT: A Trade-off Analysis","author":"gupta","year":"2017","journal-title":"Cryptology ePrint Archive"},{"key":"ref28","first-page":"84","author":"nilsson","year":"2009","journal-title":"A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay"},{"key":"ref4","year":"2016","journal-title":"Dyn Analysis Summary of Friday October 21 Attack"},{"key":"ref27","article-title":"DFARPA: Differential Fault Attack Resistant Physical Design Automation","author":"khairallah","year":"2018","journal-title":"ACM\/IEEE DATE"},{"key":"ref3","year":"2015","journal-title":"ISO\/IEC 11889-1 2015 Information technology-Trusted platform module library"},{"key":"ref6","year":"2017","journal-title":"Autonomous Emergency Braking"},{"key":"ref29","article-title":"Protecting gps from spoofers is critical to the future of navigation","author":"psiaki","year":"2016","journal-title":"IEEE Spectrum"},{"key":"ref5","year":"2016","journal-title":"Intel Automotive Security Research Workshops"},{"key":"ref8","year":"2017","journal-title":"Secure Boot Code Signing for All Chips"},{"key":"ref7","year":"2017","journal-title":"Mobile Security"},{"key":"ref2","year":"2016","journal-title":"National Institute of Standards and Technology Special Publication (SP) 800-160 Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems"},{"key":"ref9","author":"rose","year":"2016","journal-title":"Picking a Bluetooth low energy lock from a quarter mile away"},{"key":"ref1","year":"0","journal-title":"Automated Driving Levels of Driving Automation as per SAE International Standard J3016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0020-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref23","first-page":"388","author":"kocher","year":"1999","journal-title":"Differential power analysis"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265320"},{"key":"ref25","author":"lam","year":"2016","journal-title":"IoT Security Cybersecurity from IT to OT"}],"event":{"name":"2017 7th International Symposium on Embedded Computing and System Design (ISED)","location":"Durgapur","start":{"date-parts":[[2017,12,18]]},"end":{"date-parts":[[2017,12,20]]}},"container-title":["2017 7th International Symposium on Embedded Computing and System Design (ISED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8296056\/8303903\/08303906.pdf?arnumber=8303906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T16:44:23Z","timestamp":1522687463000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8303906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ised.2017.8303906","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}