{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:04:43Z","timestamp":1773842683677,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/vtc2021-spring51267.2021.9448963","type":"proceedings-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T20:27:03Z","timestamp":1623788823000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Attacks Against UDS on DoIP by Exploiting Diagnostic Communications and Their Countermeasures"],"prefix":"10.1109","author":[{"given":"Masaru","family":"Matsubayashi","sequence":"first","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Takuma","family":"Koyama","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Yasushi","family":"Okano","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Masashi","family":"Tanaka","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Asami","family":"Miyajima","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Yoshihito","family":"Oshima","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories,Tokyo,Japan"}]},{"given":"Shintaro","family":"Ukai","sequence":"additional","affiliation":[{"name":"DENSO CORPORATION,Aichi,Japan"}]},{"given":"Tasuku","family":"Wakatsuki","sequence":"additional","affiliation":[{"name":"DENSO CORPORATION,Aichi,Japan"}]},{"given":"Takeshi","family":"Sugashima","sequence":"additional","affiliation":[{"name":"DENSO CORPORATION,Aichi,Japan"}]},{"given":"Takeshi","family":"Nakamura","sequence":"additional","affiliation":[{"name":"DENSO CORPORATION,Aichi,Japan"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"FREE-FALL HACKING TESLA FROM WIRELESS TO CAN BUS","author":"nie","year":"2017","journal-title":"Proc Black Hat"},{"key":"ref11","article-title":"Security Analysis of Vehicle Diagnostics using DoIP","author":"lindberg","year":"2011","journal-title":"M S thesis"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2016.7530357"},{"key":"ref13","article-title":"Adventures in Automotive Networks and Control Units","author":"valasek","year":"2014"},{"key":"ref14","first-page":"202","article-title":"Evaluation of Vehicle Diagnostics Security &#x2013; Implementation of a Reproducible Security Access","author":"ring","year":"2014","journal-title":"Proc SECURWARE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746714"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCET48361.2019.8989318"},{"key":"ref3","first-page":"1","article-title":"Design and Implementation of a Bootloader in the Context of Intelligent Vehicel System","author":"bogdan","year":"2017","journal-title":"Proc SusTech"},{"key":"ref6","article-title":"Road vehicles &#x2013; Unified diagnostic services (UDS) &#x2013; Part1: Specification and requirements","year":"2013"},{"key":"ref5","article-title":"Road vehicles &#x2013; Diagnostic communication over Controller Area Network (DoCAN) &#x2013; Part2: Transport protocol and network layer services","year":"2016"},{"key":"ref8","article-title":"Road vehicles &#x2013; Diagnostic communication over Internet Protocol (DoIP) &#x2013; Part2: Transport protocol and network layer services","year":"2012"},{"key":"ref7","article-title":"Road vehicles &#x2013; Diagnostic communication over Internet Protocol (DoIP) &#x2013; Part1: General information and use case definition","year":"2011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2991\/icimm-16.2016.1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58610-6"},{"key":"ref9","first-page":"270","article-title":"What Today&#x2019;s Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability","author":"zoppelt","year":"2019","journal-title":"Proc IMBSA"}],"event":{"name":"2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)","location":"Helsinki, Finland","start":{"date-parts":[[2021,4,25]]},"end":{"date-parts":[[2021,4,28]]}},"container-title":["2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9448628\/9448629\/09448963.pdf?arnumber=9448963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:38:38Z","timestamp":1659483518000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9448963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/vtc2021-spring51267.2021.9448963","relation":{},"subject":[],"published":{"date-parts":[[2021,4]]}}}