{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T05:56:48Z","timestamp":1769147808631,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100008287","name":"Science and Technology Directorate","doi-asserted-by":"publisher","award":["D15PC00239"],"award-info":[{"award-number":["D15PC00239"]}],"id":[{"id":"10.13039\/100008287","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008287","name":"Science and Technology Directorate","doi-asserted-by":"publisher","award":["D15PC00302"],"award-info":[{"award-number":["D15PC00302"]}],"id":[{"id":"10.13039\/100008287","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Veh. Technol. Mag."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/mvt.2017.2778751","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T19:23:24Z","timestamp":1517513004000},"page":"66-73","source":"Crossref","is-referenced-by-count":40,"title":["Uptane: Security and Customizability of Software Updates for Vehicles"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9999-5076","authenticated-orcid":false,"given":"Trishank Karthik","family":"Kuppusamy","sequence":"first","affiliation":[]},{"given":"Lois Anne","family":"DeLong","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Cappos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"63","volume":"42","author":"kuppusamy","year":"2017","journal-title":"Securing software updates for automotives using Uptane"},{"key":"ref38","author":"kuppusamy","year":"2017","journal-title":"SOTA #5 Uptane design overview"},{"key":"ref33","author":"eitel","year":"2017","journal-title":"ATS is integrating the Uptane security framework for over-the-air software updates to connected vehicles"},{"key":"ref32","article-title":"Uptane will protect your connected car from hackers","author":"mathews","year":"2017","journal-title":"Forbes"},{"key":"ref31","article-title":"Are software updates key to stopping criminal car hacks?","author":"detsch","year":"2017","journal-title":"Christian Science Monitor"},{"key":"ref30","year":"2013","journal-title":"470m gbp to usd in Oct 2013"},{"key":"ref37","article-title":"Tesla responds to Chinese hack with a major security upgrade","author":"greenberg","year":"2016","journal-title":"Wired"},{"key":"ref36","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"0","journal-title":"20th USENIX Security Symp"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref34","article-title":"The year&#x2019;s most important innovations in security","author":"atherton","year":"2017","journal-title":"Popular Science Magazine"},{"key":"ref10","year":"2012","journal-title":"FreeBSD org intrusion announced November 17th 2012"},{"key":"ref40","author":"burrows","year":"2005","journal-title":"Modelling and resolving software dependencies"},{"key":"ref11","year":"2003","journal-title":"Rotation server compromised"},{"key":"ref12","year":"2012","journal-title":"Public Key Security Vulnerability and Mitigation"},{"key":"ref13","author":"kuhn","year":"2003","journal-title":"IMPORTANT Information regarding savannah restoration for all users"},{"key":"ref14","year":"0"},{"key":"ref15","author":"mcvoy","year":"2003","journal-title":"BK2CVS problem"},{"key":"ref16","author":"corbet","year":"2011","journal-title":"The cracking of Kernel org"},{"key":"ref17","year":"2012","journal-title":"Flame Malware Collision Attack Explained"},{"key":"ref18","author":"voss","year":"2014","journal-title":"Newly Paranoid Maintainers"},{"key":"ref19","author":"naraine","year":"2013","journal-title":"Opera software hit by &#x2018;Infrastructure Attack &#x2019; Malware signed with stolen cert"},{"key":"ref28","first-page":"673","article-title":"Mercury: Bandwidth-effective prevention of rollback attacks against community repositories","author":"kuppusamy","year":"0","journal-title":"Proc 2017 USENIX Annu Technical Conf (ATC &#x2018;17)"},{"key":"ref4","year":"2009","journal-title":"Apache org incident report for 8\/28\/2009"},{"key":"ref27","first-page":"567","article-title":"Diplomat: Using delegations to protect community repositories","author":"kuppusamy","year":"0","journal-title":"Proc USENIX Symp on Networked Systems Design and Implementation (NSDI)"},{"key":"ref3","author":"arkin","year":"2012","journal-title":"Adobe to revoke code signing certificate"},{"key":"ref6","year":"2003","journal-title":"Debian investigation report after server compromises"},{"key":"ref29","article-title":"North Korean &#x2018;cyberwarfare&#x2019; said to have cost South Korea &#x00A3;500m","author":"hern","year":"2013","journal-title":"The Guardian"},{"key":"ref5","year":"2010","journal-title":"Apache org incident report for 04\/09\/2010"},{"key":"ref8","author":"frields","year":"2008","journal-title":"Infrastructure report 2008-08-22 UTC 1200"},{"key":"ref7","year":"2012","journal-title":"Security breach on the Debian wiki 2012-07-25"},{"key":"ref2","author":"goldman","year":"2015","journal-title":"Chrysler recalls 1 4 million hackable cars"},{"key":"ref9","author":"smith","year":"2011","journal-title":"Security incident on Fedora infrastructure on 23 Jan 2011"},{"key":"ref1","article-title":"After Jeep hack, Chrysler recalls 1.4M vehicles for bug fix","author":"greenberg","year":"2015","journal-title":"Wired"},{"key":"ref20","author":"magnusson","year":"2010","journal-title":"The PHP project and code review"},{"key":"ref22","year":"2013","journal-title":"A further update on php net"},{"key":"ref21","year":"2011","journal-title":"Php net security notice"},{"key":"ref24","year":"2013","journal-title":"Data verification"},{"key":"ref23","year":"2008","journal-title":"Infrastructure report 2008-08-22 UTC 1200"},{"key":"ref26","author":"mullenweg","year":"2011","journal-title":"Password Reset"},{"key":"ref25","year":"2012","journal-title":"PhpMyAdmin corrupted copy on Korean mirror server"}],"container-title":["IEEE Vehicular Technology Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10209\/8306022\/08278174.pdf?arnumber=8278174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:00Z","timestamp":1642004580000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8278174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mvt.2017.2778751","relation":{},"ISSN":["1556-6072"],"issn-type":[{"value":"1556-6072","type":"print"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}