{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:34:35Z","timestamp":1778344475614,"version":"3.51.4"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833886","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T16:14:47Z","timestamp":1658765687000},"page":"353-362","source":"Crossref","is-referenced-by-count":11,"title":["On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats"],"prefix":"10.1109","author":[{"given":"Daniele","family":"Antonioli","sequence":"first","affiliation":[{"name":"EURECOM,Biot,France"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL,Lausanne,Switzerland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067176"},{"key":"ref38","first-page":"31","article-title":"Repairing the Bluetooth pairing protocol","author":"wong","year":"2005","journal-title":"Proceedings of International Workshop on Security Protocols"},{"key":"ref33","first-page":"1","article-title":"Nino man-in-the-middle attack on Bluetooth Secure Simple Pairing","author":"hypponen","year":"2007","journal-title":"Proceedings of the International Conference in Central Asia on Internet"},{"key":"ref32","article-title":"Breaking the bluetooth pairing&#x2013;fixed coordinate invalid curve attack","author":"biham","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00054"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1081-6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30182-0_29"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_14"},{"key":"ref35","article-title":"BLUR-tooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy","author":"antonioli","year":"2022","journal-title":"Proceedings of the Asia conference on Computer and Communications Cecurity (ASIACCS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.66-85"},{"key":"ref27","article-title":"One car, two frames: attacks on hitag-2 remote keyless entry systems revisited","author":"benadjila","year":"2017","journal-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.01.090935"},{"key":"ref2","first-page":"94","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref1","article-title":"Emerging car trends and market predictions","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326089"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_1"},{"key":"ref21","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","volume":"10","author":"rouf","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref24","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"ref26","first-page":"703","article-title":"Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer","author":"verdult","year":"2013","journal-title":"Supplement to the Proceedings of 22nd USENIX Security Symposium (Supplement to USENIX Security 13)"},{"key":"ref25","first-page":"237","article-title":"Gone in 360 seconds: Hijacking with hitag2","author":"verdult","year":"2012","journal-title":"Presented as part of the 21st USENIX Security Symposium ( USENIX Security 12)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-018-0085-1"},{"key":"ref58","article-title":"A security analysis of an in-vehicle infotainment and app platform","author":"mazloom","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)"},{"key":"ref57","article-title":"CarPlay","year":"2020"},{"key":"ref56","article-title":"Android Auto","year":"2020"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00081"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363190"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870826"},{"key":"ref52","first-page":"389","article-title":"Canvas: Fast and inexpensive automotive network mapping","author":"kulandaivel","year":"2019","journal-title":"28th USENIX Security Symposium"},{"key":"ref10","article-title":"The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR\/EDR","author":"antonioli","year":"2019","journal-title":"Proc of USENIX USENIX Security"},{"key":"ref11","article-title":"Cve-2019-9506 detail","year":"2019"},{"key":"ref40","article-title":"Attacks on the pairing protocol of Bluetooth v2.1","author":"lindell","year":"2008"},{"key":"ref12","article-title":"AUTO-ISAC Homepage","year":"2021"},{"key":"ref13","article-title":"Bluetooth Core Specification v5.3","year":"2021"},{"key":"ref14","article-title":"Become a Bluetooth SIG Member","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-121r2"},{"key":"ref16","article-title":"Key Negotiation of Bluetooth","year":"2019"},{"key":"ref17","article-title":"Bluetooth SIG Statement Regarding the Bluetooth Impersonation Attacks (BIAS) Security Vulnerability","year":"2020"},{"key":"ref18","article-title":"Car hacking: for poories","author":"miller","year":"2015","journal-title":"Tech rep IOActive Report Tech Rep"},{"key":"ref19","article-title":"Privacy4Cars Homepage","year":"2022"},{"key":"ref4","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref3","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref6","article-title":"Carsblues vehicle hack exploits vehicle infotainment systems allowing access to call logs, text messages and more","year":"2018"},{"key":"ref5","article-title":"Experimental Security Assessment on Lexus Cars","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00093"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref9","article-title":"Cve-2020-10135 detail","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134623"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref47","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"25th USENIX Security Symposium"},{"key":"ref42","article-title":"Truck hacking: An experimental analysis of the SAE j1939 standard","author":"burakova","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833886.pdf?arnumber=9833886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T16:02:36Z","timestamp":1660579356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833886","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}