{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T00:30:44Z","timestamp":1776472244682,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1505785"],"award-info":[{"award-number":["CNS-1505785"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978302","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"1044-1055","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":171,"title":["Error Handling of In-vehicle Networks Makes Them Vulnerable"],"prefix":"10.1145","author":[{"given":"Kyong-Tak","family":"Cho","sequence":"first","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Microchip MCP2515 Datasheet. {Online}."},{"key":"e_1_3_2_1_2_1","unstructured":"NXP SJA1000 datasheet. {Online} Available: www.nxp.com."},{"key":"e_1_3_2_1_3_1","unstructured":"CAN Specification Version 2.0. Bosch 1991."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/digital.ni.com\/","author":"Available CAN","year":"2001","unstructured":"Symptoms of Improper CAN Termination {Online} Available: http:\/\/digital.ni.com\/. May. 2001."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028073"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2011.13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831211.2831226"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_9_1","unstructured":"T. Hu. Deterministic and flexible communication for real-time embedded systems. Ph.D Thesis 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_11_1","volume-title":"Ttcan: a new time-triggered controller area network","author":"Leen G.","year":"2002","unstructured":"G. Leen and D. Heffernan. Ttcan: a new time-triggered controller area network. In Elsevier Microprocessors and Microsystems, 2002."},{"key":"e_1_3_2_1_12_1","volume-title":"Defcon 21","author":"Miller C.","year":"2013","unstructured":"C. Miller and C. Valasek. Adventures in automotive networks and control units. Defcon 21, 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"Black Hat USA","author":"Miller C.","year":"2015","unstructured":"C. Miller and C. Valasek. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_15_1","volume-title":"Advantages of CAN FD Error detection mechanisms compared to Classical CAN. In iCC","author":"Mutter A.","year":"2015","unstructured":"A. Mutter and F. Hartwich. Advantages of CAN FD Error detection mechanisms compared to Classical CAN. In iCC, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2159556"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1199616"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/795671.796875"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4271\/2012-01-0999"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"e_1_3_2_1_22_1","unstructured":"E. Tran. Multi-Bit Error Vulnerabilities in the Controller Area Network Protocol. Ph.D Thesis 1999."},{"key":"e_1_3_2_1_23_1","volume-title":"EDN Technical Paper","author":"Yang F.","year":"2009","unstructured":"F. Yang. A bus off case of can error passive transmitter. In EDN Technical Paper, 2009."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978302","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978302","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:40Z","timestamp":1763457940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":23,"alternative-id":["10.1145\/2976749.2978302","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978302","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}