{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:46:37Z","timestamp":1776444397022,"version":"3.51.2"},"reference-count":114,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001858","name":"VINNOVA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001858","name":"VINNOVA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CyReV project","award":["2019-03071"],"award-info":[{"award-number":["2019-03071"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Veh."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/tiv.2022.3188340","type":"journal-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:01:41Z","timestamp":1656964901000},"page":"1350-1367","source":"Crossref","is-referenced-by-count":54,"title":["A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0892-2600","authenticated-orcid":false,"given":"Kim","family":"Strandberg","sequence":"first","affiliation":[{"name":"Department of Research and Development, Volvo Cars, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4869-6409","authenticated-orcid":false,"given":"Nasser","family":"Nowdehi","sequence":"additional","affiliation":[{"name":"Volvo AB, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9548-819X","authenticated-orcid":false,"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Combine AUTOSAR standards for high-performance in-car computers","author":"Pallierer","year":"2021"},{"key":"ref2","article-title":"Evolution of IoT-enabled connectivity and applications in automotive industry: A review","volume-title":"Veh. Commun.","volume":"27","author":"Rahim","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref5","article-title":"Directive 2010\/40\/EU of the european parliament and of the council","year":"2010"},{"key":"ref6","volume-title":"Guide to Computer Forensics and Investigations","author":"Nelsons","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2020010101"},{"key":"ref8","article-title":"Is software more vulnerable today?","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.687"},{"key":"ref10","article-title":"Remote exploitation of an unaltered passenger vehicle","volume-title":"Black Hat USA","author":"Miller","year":"2015"},{"key":"ref11","first-page":"77","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. USENIX Secur. Symp.","author":"Checkoway","year":"2011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2021.3122144"},{"key":"ref14","article-title":"Uber, distracted backup driver cited by NTSB in fatal self-driving crash","year":"2021"},{"key":"ref15","article-title":"Exclusive dutch forensic lab says it has decoded Teslas driving data","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9449029"},{"key":"ref17","article-title":"UN regulation no 155","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00301"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.934"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700322"},{"key":"ref21","article-title":"Complete guide to GDPR compliance","year":"2020"},{"key":"ref22","article-title":"The drivers privacy protection act (DPPA) and the privacy of your state motor vehicle record","year":"2020"},{"key":"ref23","article-title":"Automobile event data recorders (black boxes) and privacy","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800137"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0164"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301111"},{"key":"ref27","article-title":"Guidelines on mobile device forensics","year":"2021"},{"key":"ref28","article-title":"Guide to integrating forensic techniques into incident response","year":"2020"},{"key":"ref29","article-title":"Information technology  security techniques  guidelines for identification, collection, acquisition and preservation of digital evidence","year":"2020"},{"key":"ref30","article-title":"Guidelines on mobile device forensics","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.302"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICIOT.2017.13"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2019.8855835"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102426"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/app11031268"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2021.01.040"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68734-2_11"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1911\/1\/012002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500652"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.4271\/2020-01-1326"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00055"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029512"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1515\/comp-2019-0022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3116957"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04246-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2929561"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730655"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3325817"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34647-8_8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910865"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_18"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21752-5_10"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2018.10503"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870826"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8606016"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847249"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019488"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/GET.2016.7916825"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2012.6211718"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.4108\/e-forensics.2008.32"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45096-0_17"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.11648\/j.iotcc.20200801.13"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOMOTIVESAFETY47494.2020.9293516"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.200910"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301090"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.081"},{"key":"ref69","article-title":"Vehicle communication within networks -investigation and analysis approach: A case study","author":"Steiner","year":"2019","journal-title":"Annu. ADFSL Conf. Digit. Forensics, Secur. Law"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2019.8756732"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3360664.3360665"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2019070102"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943837"},{"issue":"1","key":"ref74","article-title":"Retrieval of infotainment system artifacts from vehicles using iVe","volume":"1","author":"Whelan","year":"2018","journal-title":"J. Appl. Digit. Evidence"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2018.00009"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SPIT.2018.8350857"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75608-0_3"},{"key":"ref78","first-page":"133","article-title":"Application possibilities of digital forensic procedures in vehicle telematics systems","volume-title":"Zeszyty Naukowe Wyszej Szkoy Technicznej w Katowicach","volume":"10","author":"Ivan","year":"2018"},{"key":"ref79","first-page":"3","article-title":"Future challenges for smart cities: Cyber-security and digital forensics","volume-title":"Digit. Investigation","volume":"22","author":"Baig","year":"2017"},{"key":"ref80","article-title":"A survey on open automotive forensics","volume-title":"Proc. 11th Int. Conf. Emerg. Secur. Inf.","author":"Altschaffel","year":"2017"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1437"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989282"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.51501\/jotnafe.v33i2.35"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-013-9215-3"},{"issue":"11","key":"ref85","first-page":"1","article-title":"Forensic analysis technique of car black box","volume":"8","author":"Park","year":"2014","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-012-0653-6"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.4271\/2014-01-0495"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33678-2_11"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23602-0_20"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.4108\/e-forensics.2008.32"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8741-7_31"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2008.10"},{"key":"ref93","article-title":"Tools for ECU remapping","year":"2022"},{"key":"ref94","article-title":"Easily manage i.MX RT secure boot for production programming","year":"2022"},{"key":"ref95","article-title":"iVe 3.5","year":"2022"},{"key":"ref96","article-title":"CVE-2018-11478","year":"2022"},{"key":"ref97","article-title":"CVE-2019-12797","year":"2022"},{"key":"ref98","article-title":"A remote attack on the Bosch Drivelog connector dongle","year":"2022"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref100","article-title":"CVE-2019-9493","year":"2022"},{"key":"ref101","article-title":"CVE-2018-11477","year":"2021"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"ref103","article-title":"CVE-2016-2354","year":"2021"},{"key":"ref104","article-title":"Volvo on call","year":"2021"},{"key":"ref105","article-title":"Welcome to onStar","year":"2021"},{"key":"ref106","article-title":"Driving dataset","year":"2021"},{"key":"ref107","article-title":"An international standard supporting automated combination, validation, and analysis of cyber-investigation information","year":"2021"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41148-9_5"},{"key":"ref110","article-title":"A novel adaptive cybersecurity framework for the Internet-of-Vehicles","year":"2021"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.16"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421801"},{"key":"ref113","article-title":"Black boxes in passenger vehicles: Policy Issues","author":"Canis","year":"2020"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6685767"}],"container-title":["IEEE Transactions on Intelligent Vehicles"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7274857\/10076483\/09815132.pdf?arnumber=9815132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:55:16Z","timestamp":1706763316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9815132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":114,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tiv.2022.3188340","relation":{},"ISSN":["2379-8904","2379-8858"],"issn-type":[{"value":"2379-8904","type":"electronic"},{"value":"2379-8858","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2]]}}}