{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:05:36Z","timestamp":1770293136526,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572062"],"award-info":[{"award-number":["61572062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Satellite of Excellence in Trustworthy Software Systems"},{"name":"NRF Singapore"},{"name":"National Cyber-security R&amp;D"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/tvt.2020.2990417","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:10:23Z","timestamp":1588032623000},"page":"7116-7130","source":"Crossref","is-referenced-by-count":24,"title":["<i>CANeleon<\/i>: Protecting CAN Bus With Frame ID Chameleon"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7797-911X","authenticated-orcid":false,"given":"Kun","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2544-3989","authenticated-orcid":false,"given":"Yuebin","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1583-7570","authenticated-orcid":false,"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6000-6848","authenticated-orcid":false,"given":"Yun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"David","family":"Sanan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1_6"},{"key":"ref38","article-title":"Controller area network physical layer requirements","author":"corrigan","year":"2008"},{"key":"ref33","article-title":"4-byte Integer Hashing","author":"jenkins","year":"2007"},{"key":"ref32","article-title":"Integer hash function","author":"wang","year":"2007"},{"key":"ref31","article-title":"List of can id descriptions","author":"mond","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2919693"},{"key":"ref37","article-title":"Specification of Time Synchronization over CAN","year":"2017"},{"key":"ref36","year":"2016","journal-title":"Road Vehicles&#x2013;Controller Area Network (CAN)-Part 2 High-Speed Medium Access Unit"},{"key":"ref35","article-title":"Requirements on crypto stack","volume":"4 3 1","year":"2017","journal-title":"AUTOSAR CP"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.02.014"},{"key":"ref28","article-title":"Cybersecurity game-change research and development recommendations","year":"2010"},{"key":"ref27","article-title":"Moving target defense","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3759626"},{"key":"ref2","year":"2015"},{"key":"ref1","article-title":"CAN Specification Version 2.0","year":"1991"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270342"},{"key":"ref22","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle can","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288327"},{"key":"ref26","author":"stallings","year":"2016","journal-title":"Cryptography and Network Security Principles and Practice"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref50","first-page":"389","article-title":"CANvas: Fast and inexpensive automotive network mapping","author":"kulandaivel","year":"2019","journal-title":"Proc USENIX Security07"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"ref12","first-page":"226","article-title":"Applying intrusion detection to automotive it-early insights and remaining challenges","volume":"4","author":"hoppe","year":"2009","journal-title":"Journal of Info Assurance and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"ref15","first-page":"8","article-title":"Cyber security enhancing CAN transceivers","author":"elend","year":"2017","journal-title":"Proc 16th Int Conf CANS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"ref17","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Proc USENIX Security07"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref4","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume":"4","author":"checkoway","year":"2011","journal-title":"Proc USENIX Security07"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref6","article-title":"Experimental security assessment of BMW cars: A summary report","year":"2018"},{"key":"ref5","first-page":"1?94","article-title":"A survey of remote automotive attack surfaces","author":"miller","year":"2014","journal-title":"Proc Black Hat USA"},{"key":"ref8","first-page":"1","article-title":"Free-fall: Hacking tesla from wireless to can bus","author":"nie","year":"2017","journal-title":"Proc BlackHat USA"},{"key":"ref7","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"miller","year":"2015","journal-title":"Proc Black Hat USA"},{"key":"ref49","article-title":"Towards viable intrusion detection methods for the automotive controller area network","author":"tomlinson","year":"2018","journal-title":"Proc 2nd ACM Comput Sci Cars Symp"},{"key":"ref9","first-page":"1","article-title":"Over-the-air: How we remotely compromised the gateway, BCM, and autopilot ECUs of tesla cars","author":"nie","year":"2018","journal-title":"Proc BlackHat USA"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref45","article-title":"Controller area network (CAN) device and method for controlling CAN traffic","author":"gerhard","year":"2019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-018-0085-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2795384"},{"key":"ref42","first-page":"1","article-title":"Exploring attack surfaces of voltage-based intrusion detection systems in controller area networks","author":"sagong","year":"0","journal-title":"Proc Escar Europe"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-811978-5.00007-9"},{"key":"ref43","article-title":"Frequency accuracy & stability dependencies of crystal oscillators","author":"zhou","year":"2008"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/9141504\/09079183.pdf?arnumber=9079183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:44:58Z","timestamp":1651067098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9079183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":50,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2020.2990417","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}