{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T05:03:20Z","timestamp":1746594200427,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T00:00:00Z","timestamp":1654387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T00:00:00Z","timestamp":1654387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,5]]},"DOI":"10.1109\/iv51971.2022.9827092","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T15:33:28Z","timestamp":1658244808000},"page":"1333-1339","source":"Crossref","is-referenced-by-count":2,"title":["AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments"],"prefix":"10.1109","author":[{"given":"Ze","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Sanjay Sri Vallabh","family":"Singapuram","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Qingzhao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"David Ke","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Brandon","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Scott","family":"Mahlke","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,MI,USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science,Irvine,CA,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00035"},{"article-title":"Performance, Security, and Safety Requirements Testing for Smart Systems Through Systematic Software Analysis","year":"2019","author":"hong","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"ref13","first-page":"75","article-title":"Llvm: A compilation framework for lifelong program analysis & transformation","author":"lattner","year":"2004","journal-title":"Code Generation and Optimization Feedback-Directed and Runtime Optimization"},{"key":"ref14","first-page":"62","article-title":"Localization estimation algorithm under cyber delay attack for autonomous vehicle based on lgsvl\/apollo","volume":"12","author":"minjian","year":"2021","journal-title":"Journal of Automotive Safety and Energy"},{"key":"ref15","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"petit","year":"2015","journal-title":"Black Hat Europe'06"},{"journal-title":"Savior Securing autonomous vehicles with robust physical invariants","year":"0","author":"quinonez","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref18","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","author":"tu","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359847"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2014.1162"},{"key":"ref7","article-title":"Exploiting consistency among heterogeneous sensors for vehicle anomaly detection","author":"ganesan","year":"2017","journal-title":"Technical Report"},{"journal-title":"Baidu Apollo Auto","year":"2021","key":"ref2"},{"journal-title":"Autoware AI","year":"2021","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref20","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"yan","year":"2016","journal-title":"DEF CON"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3410220.3460101"},{"key":"ref21","first-page":"1527","article-title":"All your gps are belong to us: Towards stealthy manipulation of road navigation systems","author":"zeng","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"}],"event":{"name":"2022 IEEE Intelligent Vehicles Symposium (IV)","start":{"date-parts":[[2022,6,4]]},"location":"Aachen, Germany","end":{"date-parts":[[2022,6,9]]}},"container-title":["2022 IEEE Intelligent Vehicles Symposium (IV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9826996\/9826997\/09827092.pdf?arnumber=9827092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T16:05:13Z","timestamp":1659974713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9827092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iv51971.2022.9827092","relation":{},"subject":[],"published":{"date-parts":[[2022,6,5]]}}}