{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:15:48Z","timestamp":1766578548812,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation under its Campus for Research Excellence and Technological Enterprise programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Technische Universit\u00e4t M\u00fcnchen\u2014Institute for Advanced Study, through the German Excellence Initiative and the European Union Seventh Framework Programme","doi-asserted-by":"publisher","award":["291763"],"award-info":[{"award-number":["291763"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/tcad.2017.2666605","type":"journal-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T19:17:31Z","timestamp":1486667851000},"page":"1790-1803","source":"Crossref","is-referenced-by-count":53,"title":["Automotive Electrical and Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5302-8937","authenticated-orcid":false,"given":"Peter","family":"Waszecki","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Mundhenk","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Lukasiewycz","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]},{"given":"Samarjit","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292913"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.29"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399300"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.58"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399297"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref36","first-page":"1","article-title":"SAFE: Security-aware FlexRay scheduling engine","author":"han","year":"2014","journal-title":"Proc Design and Test in Europe (DATE) Conf"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2014.2354011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691106"},{"journal-title":"A Look Inside Battery-Management Systems","year":"2015","author":"roderick","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref12","first-page":"1","article-title":"Delay bounds for CAN communication in automotive applications","author":"klehmet","year":"2008","journal-title":"Proc Conf Meas Model Eval Comput Commun Syst (MMB)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2003.1253607"},{"key":"ref14","first-page":"1","article-title":"Generating event traces based on arrival curves","author":"kuenzli","year":"2006","journal-title":"Proc Conf Meas Modelling and Eval Comput Commun Syst (MMB)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.1999.811194"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.2002.1137394"},{"article-title":"A simple approximation method for reducing the complexity of modular performance analysis","year":"2010","author":"suppiger","key":"ref17"},{"key":"ref18","first-page":"235","article-title":"Comparison of event-triggered and time-triggered concepts with regard to distributed control systems","author":"albert","year":"2004","journal-title":"Proc Embedded World Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744906"},{"key":"ref28","first-page":"1","article-title":"Security analysis of a cryptographically-enabled RFID device","volume":"5","author":"bono","year":"2005","journal-title":"Proc Usenix Security Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref27","first-page":"290","article-title":"Likelihood of threats to connected vehicles","volume":"5","author":"othmane","year":"2014","journal-title":"Int J Next-Gener Comput"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref6","first-page":"1","article-title":"Sniffing\/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy","author":"hoppe","year":"2007","journal-title":"2nd Workshop on Embedded Systems Security (WESS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2453967"},{"key":"ref5","first-page":"165","article-title":"Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC) and replay attacks on the power window system","author":"hoppe","year":"2007","journal-title":"Proc Autom Security VDI-Berichte Nr VDI\/VW Gemeinschaftstagung Autom Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2573598"},{"journal-title":"Cybersecurity Best Practices for Modern Vehicles","year":"2016","author":"administration","key":"ref7"},{"key":"ref2","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Security Symp"},{"journal-title":"Nissan LEAF Owner&#x2019;s Manual&#x2014;Section LAN Systems","year":"2013","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SAMOS.2015.7363675"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228436"},{"key":"ref21","volume":"2050","author":"boudec","year":"2001","journal-title":"Network Calculus A Theory of Deterministic Queuing Systems for the Internet"},{"journal-title":"Open Design Space Exploration Framework","year":"2016","author":"lukasiewycz","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-010-9055-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.205"},{"journal-title":"Gurobi Optimizer Reference Manual","year":"2015","key":"ref25"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/8071066\/07849145.pdf?arnumber=7849145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T17:03:00Z","timestamp":1642006980000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7849145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":38,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2017.2666605","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}