{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:40:39Z","timestamp":1761324039240,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T00:00:00Z","timestamp":1453939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore National Research Foundation under its Campus for Research Excellence and Technological Enterprise (CREATE) programme"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2016,1,28]]},"abstract":"<jats:p>Security in automotive in-vehicle networks is an increasing problem with the growing connectedness of road vehicles. This article proposes a security-aware priority assignment for automotive controller area network (CAN) platforms with the aim of mitigating scaling effects of attacks on vehicle fleets. CAN is the dominating field bus in the automotive domain due to its simplicity, low cost, and robustness. While messages might be encrypted to enhance the security of CAN systems, their priorities are usually identical for automotive platforms, comprising generally a large number of vehicle models. As a result, the identifier uniquely defines which message is sent, allowing attacks to scale across a fleet of vehicles with the same platform. As a remedy, we propose a methodology that is capable of determining obfuscated message identifiers for each individual vehicle. Since identifiers directly represent message priorities, the approach has to take the resulting response time variations into account while satisfying application deadlines for each vehicle schedule separately. Our approach relies on Quadratically Constrained Quadratic Program (QCQP) solving in two stages, specifying first a set of feasible fixed priorities and subsequently bounded priorities for each message. With the obtained bounds, obfuscated identifiers are determined, using a very fast randomized sampling. The experimental results, consisting of a large set of synthetic test cases and a realistic case study, give evidence of the efficiency of the proposed approach in terms of scalability. The results also show that the diversity of obtained identifiers is effectively optimized with our approach, resulting in a very good obfuscation of CAN messages in in-vehicle communication.<\/jats:p>","DOI":"10.1145\/2831232","type":"journal-article","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T20:37:54Z","timestamp":1454359074000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Security-Aware Obfuscated Priority Assignment for Automotive CAN Platforms"],"prefix":"10.1145","volume":"21","author":[{"given":"Martin","family":"Lukasiewycz","sequence":"first","affiliation":[{"name":"TUM CREATE Limited, Singapore"}]},{"given":"Philipp","family":"Mundhenk","sequence":"additional","affiliation":[{"name":"TUM CREATE Limited, Singapore"}]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[{"name":"TUM CREATE Limited, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,1,28]]},"reference":[{"issue":"2","key":"e_1_2_1_1_1","first-page":"1","article-title":"Specification of RTE","volume":"4","author":"AUTOSAR","year":"2014","journal-title":"Version"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2095256.2095257"},{"key":"e_1_2_1_3_1","first-page":"0b","article-title":"Controller area network","volume":"2","year":"1991","journal-title":"Version"},{"volume-title":"Proceedings of the International Conference on Computer Applications and Industrial Electronics (ICCAIE'11)","year":"2011","author":"Caliebe P.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of the 20th USENIX Conference on Security (USENIX'11)","author":"Checkoway S.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278553"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-007-9012-7"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2039550"},{"volume-title":"Proceedings of the Conference on Emerging Technologies and Factory Automation (ETFA). 1--8. DOI:http:\/\/dx.doi.org\/10","year":"2010","author":"Di Natale M.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","unstructured":"FlexRay Consortium. 2005. FlexRay communications systems - Protocol specification Version 2.1 Rev. A. (2005). http:\/\/www.flexray.com.  FlexRay Consortium. 2005. FlexRay communications systems - Protocol specification Version 2.1 Rev. A. (2005). http:\/\/www.flexray.com."},{"key":"e_1_2_1_11_1","unstructured":"Gurobi Optimization Inc. 2015. Gurobi optimizer reference manual. (2015). http:\/\/www.gurobi.com.  Gurobi Optimization Inc. 2015. Gurobi optimizer reference manual. (2015). http:\/\/www.gurobi.com."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.17"},{"volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe (DATE'14)","year":"2014","author":"Han G.","key":"e_1_2_1_13_1"},{"volume-title":"Vehicle-to-vehicle Communications: Readiness of V2V Technology for Application. Technical Report. DOT HS 812 014. V. S. Department of Transportation, National Highway Traffic Safety Administration","year":"2014","author":"Harding John","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of the 13th International CAN Conference (iCC'12)","year":"2012","author":"Hartwich F.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.5.390"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1990.128748"},{"volume-title":"Proceedings of the International Conference on Computer-Aided Design (ICCAD'13)","year":"2013","author":"Lin C.-W.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"C.-W. Lin Q. Zhu and A Sangiovanni-Vincentelli. 2014. Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems. IEEE Embed. Syst. Lett. PP 99 (2014). DOI:http:\/\/dx.doi.org\/10.1109\/LES.2014.2354011  C.-W. Lin Q. Zhu and A Sangiovanni-Vincentelli. 2014. Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems. IEEE Embed. Syst. Lett. PP 99 (2014). DOI:http:\/\/dx.doi.org\/10.1109\/LES.2014.2354011","DOI":"10.1109\/ICCAD.2014.7001325"},{"volume-title":"Proceedings of the Work-in-Progress and Industrial Sessions at the 13th Euromicro Conference on Real-Time Systems (ECRTS'01)","author":"Lisper B.","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe (DATE'13)","year":"2013","author":"Lukasiewycz M.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2005.43"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.44"},{"volume-title":"Proceedings of DEF CON.","author":"Miller C.","key":"e_1_2_1_25_1"},{"volume-title":"Proceedings of Black Hat.","author":"Miller C.","key":"e_1_2_1_26_1"},{"volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe (DATE'15)","author":"Mundhenk P.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878986"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024817"},{"volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe (DATE'13)","year":"2013","author":"Sagstetter F.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"volume-title":"Honeypots: Tracking Hackers.","year":"2003","author":"Spitzner Lance","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0967-0661(95)00112-8"},{"volume-title":"Transforming Automobile Assembly","author":"Wilhelm B.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","first-page":"1","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"99","author":"Woo S.","year":"2014","journal-title":"IEEE Trans. Intell. Transport. Syst. PP"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2603850"},{"volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe (DATE'07)","year":"2007","author":"Zheng W.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362336.2362352"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2831232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,28]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,1,28]]}},"alternative-id":["10.1145\/2831232"],"URL":"https:\/\/doi.org\/10.1145\/2831232","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2016,1,28]]},"assertion":[{"value":"2015-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}