{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T23:42:55Z","timestamp":1769125375538,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789873","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Mobile applications for connected cars: Security analysis and risk assessment"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Topman","sequence":"first","affiliation":[{"name":"Loughborough University,School of Science, Department of Computer Science,UK"}]},{"given":"Asma","family":"Adnane","sequence":"additional","affiliation":[{"name":"Loughborough University,School of Science, Department of Computer Science,UK"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Hacking the Nissan Leaf","author":"helme","year":"2016","journal-title":"SteelCon 2016"},{"key":"ref32","article-title":"Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs","author":"hunt","year":"2016"},{"key":"ref31","article-title":"NVD - CVE-2017-9663","year":"2017"},{"key":"ref30","article-title":"NVD - CVE-2017-12695","year":"2017"},{"key":"ref10","article-title":"Hackers Remotely Kill a Jeep on the Highway&#x2014;With Me in It","author":"greenberg","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2020.102414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110312"},{"key":"ref13","first-page":"27","article-title":"Proposal for a new UN Regulation on uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system","volume":"2020","year":"2020"},{"key":"ref14","author":"till","year":"2020","journal-title":"What is UNECE WP 29?"},{"key":"ref15","article-title":"HEAVENS-HEAling Vulnerabilities to ENhance Software Security and Safety Dnr 2012-04625 Document Title Security models Project Title HEAling Vulnerabilities to ENhance Software Security and Safety","year":"2016"},{"key":"ref16","article-title":"DRAFT INTERNATIONAL STANDARD ISO\/SAE DIS 21434","year":"2020","journal-title":"Tech Rep"},{"key":"ref17","article-title":"Car Hacking - Analysis of the Mercedes Connected Vehicle API","author":"ruef","year":"2018"},{"key":"ref18","article-title":"CVE-2018-18071 &#x2014; Daimler Mercedes Me App Certificate Pinning information disclosure (VulDB 125081)","year":"2018"},{"key":"ref19","article-title":"NVD - CVE-2018-18071","author":"database","year":"2018"},{"key":"ref28","article-title":"NVD - CVE-2017-12697","year":"2017"},{"key":"ref4","article-title":"Upstream Security: 2021 Global Automotive Cyber security Report","year":"2021","journal-title":"Tech Rep"},{"key":"ref27","article-title":"NVD - CVE-2017-6054","author":"database","year":"2017"},{"key":"ref3","article-title":"A State-of-the-Art Report on Vehicular Security","volume":"2015","author":"rosenstatter","year":"2017","journal-title":"HoliSec Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205994"},{"key":"ref29","article-title":"General Motors and Shanghai OnStar (SOS) iOS Client &#x2014; CISA","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0005952904690478"},{"key":"ref8","author":"miller","year":"2015","journal-title":"Remote exploitation of an unaltered passenger vehicle"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_12"},{"key":"ref2","article-title":"Un-locking full value from data from connected cars","author":"bertoncello","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/et.2017.0205"},{"key":"ref1","article-title":"Connected Car Market by Technology (3G, 4G\/LTE, and 5G), Connectivity Solution (Integrated, Embedded, and Tethered), Service (Driver Assistance, Safety, Entertainment, Well-being, Vehicle Management, and Mobility Management), and End Use (Original Equipme","author":"singh","year":"2020","journal-title":"Allied Market Research Tech Rep"},{"key":"ref20","article-title":"Tesla cars can be stolen by hacking the app","year":"0"},{"key":"ref22","article-title":"OwnStar Device Can Remotely Locate, Unlock, and Start GM Cars","author":"fisher","year":"2015"},{"key":"ref21","article-title":"Tesla-Stealing Hack is about Much More than Tesla","author":"goodney","year":"2016"},{"key":"ref24","article-title":"OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes Cars","author":"fisher","year":"2015"},{"key":"ref23","article-title":"Radio hacking: Cars, hardware, and more!","author":"kamkar","year":"2016","journal-title":"The Open Web Application Security Project (OWASP)"},{"key":"ref26","article-title":"Hyundai Motor America Blue Link &#x2014; CISA","year":"2017"},{"key":"ref25","article-title":"NVD - CVE-2017-6052","year":"2017"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","location":"Budapest, Hungary","start":{"date-parts":[[2022,4,25]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789873.pdf?arnumber=9789873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:32Z","timestamp":1656965432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789873","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}