{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:12:27Z","timestamp":1771611147888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["FNR\/P14\/8149128"],"award-info":[{"award-number":["FNR\/P14\/8149128"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"DOI":"10.1145\/2994487.2994489","type":"proceedings-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T12:29:21Z","timestamp":1477916961000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems"],"prefix":"10.1145","author":[{"given":"Antonio","family":"Lima","sequence":"first","affiliation":[{"name":"SnT - University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Francisco","family":"Rocha","sequence":"additional","affiliation":[{"name":"SnT - University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Marcus","family":"V\u00f6lp","sequence":"additional","affiliation":[{"name":"SnT - University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Paulo","family":"Esteves-Ver\u00edssimo","sequence":"additional","affiliation":[{"name":"SnT - University of Luxembourg, Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AUTOSAR\n\n  \n  : Automotive open system architecture. Accessed: 2016-07-22.  AUTOSAR: Automotive open system architecture. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_2_1","unstructured":"Media oriented systems transport. http:\/\/www.mostcooperation.com\/.  Media oriented systems transport. http:\/\/www.mostcooperation.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Motor vehicles increasingly vulnerable to remote exploits. https:\/\/www.ic3.gov\/media\/2016\/160317.aspx. Accessed: 2016-03-21.  Motor vehicles increasingly vulnerable to remote exploits. https:\/\/www.ic3.gov\/media\/2016\/160317.aspx. Accessed: 2016-03-21."},{"key":"e_1_3_2_1_4_1","unstructured":"Second tesla autopilot crash under federal scrutiny. http:\/\/money.cnn.com\/2016\/07\/06\/autos\/tesla-autopilot-accident\/. Accessed: 2016-07-08.  Second tesla autopilot crash under federal scrutiny. http:\/\/money.cnn.com\/2016\/07\/06\/autos\/tesla-autopilot-accident\/. Accessed: 2016-07-08."},{"key":"e_1_3_2_1_5_1","unstructured":"Tesla's autopilot has had its first deadly crash. https:\/\/www.wired.com\/2016\/06\/teslas-autopilot-first-deadly-crash\/. Accessed: 2016-07-05.  Tesla's autopilot has had its first deadly crash. https:\/\/www.wired.com\/2016\/06\/teslas-autopilot-first-deadly-crash\/. Accessed: 2016-07-05."},{"key":"e_1_3_2_1_6_1","volume-title":"Monthly Report","year":"2016"},{"key":"e_1_3_2_1_7_1","unstructured":"N. H. T. S. Administration et al. Preliminary statement of policy concerning automated vehicles. Washington DC 2013.  N. H. T. S. Administration et al. Preliminary statement of policy concerning automated vehicles. Washington DC 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"e_1_3_2_1_11_1","volume-title":"FISITA 2010 World Automotive Congress","volume":"8","author":"Apvrille L.","year":"2010"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872371"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of the 5th International Workshop on Real-Time Networks (RTN'06)","author":"Bril R.","year":"2006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2005.1612713"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615530"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/977091.977098"},{"key":"e_1_3_2_1_18_1","unstructured":"CBSNEWS. Toyota \"unintended acceleration\" has killed 89. http:\/\/www.cbsnews.com\/news\/toyota-unintended-acceleration-has-killed-89\/. Accessed: 2016-07-22.  CBSNEWS. Toyota \"unintended acceleration\" has killed 89. http:\/\/www.cbsnews.com\/news\/toyota-unintended-acceleration-has-killed-89\/. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium","author":"Checkoway S.","year":"2011"},{"issue":"1","key":"e_1_3_2_1_20_1","first-page":"198","article-title":"Flexray communications system-protocol specification","volume":"2","author":"F. Consortium et al.","year":"2005","journal-title":"Version"},{"key":"e_1_3_2_1_21_1","volume-title":"Massachusetts Institute of Technology, 2016","author":"Costan V.","year":"2016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_24_1","unstructured":"E. Enterprise. Erika enterprise 3. http:\/\/erika.tuxfamily.org\/drupal\/content\/erika-enterprise-3. Accessed: 2016-07-22.  E. Enterprise. Erika enterprise 3. http:\/\/erika.tuxfamily.org\/drupal\/content\/erika-enterprise-3. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958251"},{"key":"e_1_3_2_1_26_1","volume-title":"Mesh and Ad Hoc Communications and Networks (SECON)","author":"Ghaderi M.","year":"2013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.284"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Greene. Intel Trusted Execution Technology -- Hardware-based Technology for Enhancing Server Platform Security 2010. http:\/\/www.intel.de\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/trusted-execution-technology-security-paper.pdf (Accessed: 2016-07-22).  J. Greene. Intel Trusted Execution Technology -- Hardware-based Technology for Enhancing Server Platform Security 2010. http:\/\/www.intel.de\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/trusted-execution-technology-security-paper.pdf (Accessed: 2016-07-22)."},{"key":"e_1_3_2_1_29_1","first-page":"11","volume-title":"12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT16)","author":"Hamad M.","year":"2016"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694347"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2012.24"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPT0 95","author":"Herzberg A.","year":"1995"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834114"},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Annual Technical Conference (ATC). USENIX","author":"Kato S.","year":"2011"},{"issue":"11","key":"e_1_3_2_1_37_1","article-title":"Topology base routing attacks in vehicular ad hoc network -- survey","volume":"3","author":"Khandelwal S.","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30081-7"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.61"},{"key":"e_1_3_2_1_40_1","unstructured":"H. Kopetz and P. Ver\u00edssimo. Distributed Systems chapter Real-Time and Dependability Concepts. ACM-Press Addison-Wesley 2nd edition 1993.   H. Kopetz and P. Ver\u00edssimo. Distributed Systems chapter Real-Time and Dependability Concepts. ACM-Press Addison-Wesley 2nd edition 1993."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_43_1","unstructured":"J. Lewis. A smart bomb in every garage? Driverless cars and the future of terrorist attacks. https:\/\/www.start.umd.edu\/news\/smart-bomb-every-garage-driverless-cars-and-future-terrorist-attacks. Accessed: 2016-03-21.  J. Lewis. A smart bomb in every garage? Driverless cars and the future of terrorist attacks. https:\/\/www.start.umd.edu\/news\/smart-bomb-every-garage-driverless-cars-and-future-terrorist-attacks. Accessed: 2016-03-21."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559038"},{"key":"e_1_3_2_1_45_1","first-page":"345","volume-title":"Communications and Applications Conference (ComComAp)","author":"Lu H.","year":"2012"},{"key":"e_1_3_2_1_46_1","volume-title":"Technology and Communication - University of Luxembourg","author":"Ludivig P.","year":"2015"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"e_1_3_2_1_48_1","volume-title":"Black Hat USA","author":"Miller C.","year":"2015"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_3_2_1_51_1","unstructured":"C. of Oklahoma County. Bookout vs toyota. http:\/\/www.safetyresearch.net\/Library\/Bookout_v_Toyota_Barr_REDACTED.pdf. Accessed: 2016-07--22.  C. of Oklahoma County. Bookout vs toyota. http:\/\/www.safetyresearch.net\/Library\/Bookout_v_Toyota_Barr_REDACTED.pdf. Accessed: 2016-07--22."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496680"},{"key":"e_1_3_2_1_53_1","volume-title":"Microchip Techn. Inc","author":"Pazul K.","year":"1999"},{"key":"e_1_3_2_1_54_1","volume-title":"Black Hat DC","author":"Perez D.","year":"2011"},{"issue":"2","key":"e_1_3_2_1_55_1","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit J.","year":"2015","journal-title":"IEEE Trans. on Intelligent Transportation Systems"},{"key":"e_1_3_2_1_56_1","volume-title":"Black Hat Europe","author":"Petit J.","year":"2015"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005325001550162"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370616.1370618"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1286317"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.1998.813317"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_62_1","volume-title":"DTIC Document","author":"Sampigethaya K.","year":"2005"},{"key":"e_1_3_2_1_63_1","volume-title":"Automation and Test in Europe - Demo","author":"Schlatow J.","year":"2016"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2015.18"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"e_1_3_2_1_67_1","volume-title":"Institute for Information Security","author":"Staggs J.","year":"2013"},{"key":"e_1_3_2_1_68_1","volume-title":"25th Joint VDI\/VW Automotive Security Conference","author":"Stumpf F.","year":"2009"},{"key":"e_1_3_2_1_69_1","unstructured":"Sysgo. Pikeos. https:\/\/www.sysgo.com\/solutions\/industry-solutions\/automotive\/. Accessed: 2016-07-22.  Sysgo. Pikeos. https:\/\/www.sysgo.com\/solutions\/industry-solutions\/automotive\/. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_70_1","unstructured":"C. Szegedy W. Zaremba I. Sutskever J. Bruna D. Erhan I. Goodfellow and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 2013.  C. Szegedy W. Zaremba I. Sutskever J. Bruna D. Erhan I. Goodfellow and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 2013."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1994.342710"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.78"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.95"},{"key":"e_1_3_2_1_74_1","volume-title":"SAFECOMP 2013 - Workshop ASCoMS (Architecting Safety in Collaborative Mobile Systems) of the 32nd International Conference on Computer Safety, Reliability and Security","author":"Villani E.","year":"2013"},{"key":"e_1_3_2_1_75_1","unstructured":"Windriver. Vxworks. http:\/\/windriver.com\/products\/vxworks\/. Accessed: 2016-07-22.  Windriver. Vxworks. http:\/\/windriver.com\/products\/vxworks\/. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1_6"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2925426.2926265"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"},{"key":"e_1_3_2_1_80_1","unstructured":"J. Yoshida. Can bus can be encrypted says trillium. http:\/\/www.eetimes.com\/document.asp?doc_id=1328081 Oct. 2015. Accessed: 2016-07-22.  J. Yoshida. Can bus can be encrypted says trillium. http:\/\/www.eetimes.com\/document.asp?doc_id=1328081 Oct. 2015. Accessed: 2016-07-22."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2013.6781979"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994487.2994489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2994487.2994489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:41Z","timestamp":1750217981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994487.2994489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":82,"alternative-id":["10.1145\/2994487.2994489","10.1145\/2994487"],"URL":"https:\/\/doi.org\/10.1145\/2994487.2994489","relation":{},"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"2016-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}