{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:33:19Z","timestamp":1775367199250,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3055004.3055016","type":"proceedings-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T12:27:28Z","timestamp":1491827248000},"page":"207-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Hardware module-based message authentication in intra-vehicle networks"],"prefix":"10.1145","author":[{"given":"Eric","family":"Wang","sequence":"first","affiliation":[{"name":"Thomas Jefferson High School for Science and Technology"}]},{"given":"William","family":"Xu","sequence":"additional","affiliation":[{"name":"Thomas Jefferson High School for Science and Technology"}]},{"given":"Suhas","family":"Sastry","sequence":"additional","affiliation":[{"name":"Thomas Jefferson High School for Science and Technology"}]},{"given":"Songsong","family":"Liu","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.39"},{"key":"e_1_3_2_1_2_1","volume-title":"The Keccak sponge function family","author":"Bertoni G.","year":"2011","unstructured":"Bertoni , G. , Daemen , J. , Peeters , M. , and Van Assche , G. The Keccak sponge function family , 2011 . Submission to NIST's SHA- 3 competition (2011). Bertoni, G., Daemen, J., Peeters, M., and Van Assche, G. The Keccak sponge function family, 2011. Submission to NIST's SHA-3 competition (2011)."},{"key":"e_1_3_2_1_3_1","first-page":"300240","author":"Bosch R.","year":"1991","unstructured":"Bosch , R. Can specification version 2. 0. Rober Bousch Gmb H , Postfach 300240 ( 1991 ). Bosch, R. Can specification version 2.0. Rober Bousch GmbH, Postfach 300240 (1991).","journal-title":"Postfach"},{"key":"e_1_3_2_1_4_1","first-page":"6","volume-title":"Proceedings of the 20th USENIX Conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association","author":"Checkoway S.","unstructured":"Checkoway , S. , Mccoy , D. , Kantor , B. , Anderson , D. , Shacham , H. , Savage , S. , Koscher , K. , Czeskis , A. , Roesner , F. , and Kohno , T . Comprehensive experimental analyses of automotive attack surfaces . In Proceedings of the 20th USENIX Conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association , pp. 6 -- 6 . Checkoway, S., Mccoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., and Kohno, T. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX Conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association, pp. 6--6."},{"key":"e_1_3_2_1_5_1","volume-title":"Application Report","author":"Corrigan S.","year":"2008","unstructured":"Corrigan , S. Introduction to the Controller Area Network (CAN). Texas Instrument , Application Report ( 2008 ). Corrigan, S. Introduction to the Controller Area Network (CAN). Texas Instrument, Application Report (2008)."},{"key":"e_1_3_2_1_6_1","volume-title":"3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2011)","author":"Diewald S.","year":"2011","unstructured":"Diewald , S. , M\u00f6ller , A. , Roalter , L. , and Kranz , M . Mobile device integration and interaction in the automotive domain . In 3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2011) ( 2011 ). Diewald, S., M\u00f6ller, A., Roalter, L., and Kranz, M. Mobile device integration and interaction in the automotive domain. In 3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2011) (2011)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Embedded Security in Cars Conference","author":"Glas B.","year":"2012","unstructured":"Glas , B. , Guajardo , J. , Hacioglu , H. , Ihle , M. , Wehefritz , K. , and Yavuz , A . Signal-based automotive communication security and its interplay with safety requirements . In Proceedings of Embedded Security in Cars Conference ( 2012 ). Glas, B., Guajardo, J., Hacioglu, H., Ihle, M., Wehefritz, K., and Yavuz, A. Signal-based automotive communication security and its interplay with safety requirements. In Proceedings of Embedded Security in Cars Conference (2012)."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/assip.cos.gmu.edu\/","author":"GMU. The George Mason University Aspiring Scientists Summer Internship Program.","year":"2016","unstructured":"GMU. The George Mason University Aspiring Scientists Summer Internship Program. http:\/\/assip.cos.gmu.edu\/ , 2016 (accessed March 2, 2017). GMU. The George Mason University Aspiring Scientists Summer Internship Program. http:\/\/assip.cos.gmu.edu\/, 2016 (accessed March 2, 2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.137"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502546"},{"key":"e_1_3_2_1_11_1","volume-title":"Vehicle-to-vehicle communications: Readiness of v2v technology for application. National Highway Traffic Safety Administration","author":"Harding J.","year":"2014","unstructured":"Harding , J. , Powell , G. , Yoon , R. , Fikentscher , J. , Doyle , C. , Sade , D. , Lukuc , M. , Simons , J. , and Wang , J . Vehicle-to-vehicle communications: Readiness of v2v technology for application. National Highway Traffic Safety Administration ( 2014 ). Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M., Simons, J., and Wang, J. Vehicle-to-vehicle communications: Readiness of v2v technology for application. National Highway Traffic Safety Administration (2014)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_13_1","volume-title":"Road Vehicles Controller Area Network (CAN) Part 2: High-speed medium access unit","year":"2003","unstructured":"ISO. 11898-2 , Road Vehicles Controller Area Network (CAN) Part 2: High-speed medium access unit . International Organization for Standardization ( 2003 ). ISO. 11898-2, Road Vehicles Controller Area Network (CAN) Part 2: High-speed medium access unit. International Organization for Standardization (2003)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704153"},{"key":"e_1_3_2_1_16_1","volume-title":"Local Interconnect Network (LIN)","author":"M\u00fcller D.","year":"2009","unstructured":"M\u00fcller , D. , Sommer , D. , and Stegemann , S . Local Interconnect Network (LIN) , 2009 . M\u00fcller, D., Sommer, D., and Stegemann, S. Local Interconnect Network (LIN), 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0174"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945510"},{"key":"e_1_3_2_1_20_1","unstructured":"STAGGS J. How to Hack your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles.  STAGGS J. How to Hack your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles."},{"key":"e_1_3_2_1_21_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Van Herrewege A.","year":"2011","unstructured":"Van Herrewege , A. , Singelee , D. , and Verbauwhede , I . CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus . In ECRYPT Workshop on Lightweight Cryptography ( 2011 ), vol. 2011 . Van Herrewege, A., Singelee, D., and Verbauwhede, I. CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography (2011), vol. 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115556"},{"key":"e_1_3_2_1_24_1","first-page":"1088","volume-title":"Automation & Test in Europe Conference & Exhibition","author":"Ziermann T.","year":"2009","unstructured":"Ziermann , T. , Wildermann , S. , and Teich , J . CAN+: a new backward-compatible Controller Area Network (CAN) protocol with up to 16X higher data rates. In 2009 Design , Automation & Test in Europe Conference & Exhibition ( 2009 ), IEEE, pp. 1088 -- 1093 . Ziermann, T., Wildermann, S., and Teich, J. CAN+: a new backward-compatible Controller Area Network (CAN) protocol with up to 16X higher data rates. In 2009 Design, Automation & Test in Europe Conference & Exhibition (2009), IEEE, pp. 1088--1093."}],"event":{"name":"ICCPS '17: ACM\/IEEE 8th International Conference on Cyber-Physical Systems","location":"Pittsburgh Pennsylvania","acronym":"ICCPS '17"},"container-title":["Proceedings of the 8th International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055004.3055016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:51Z","timestamp":1750217811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":24,"alternative-id":["10.1145\/3055004.3055016","10.1145\/3055004"],"URL":"https:\/\/doi.org\/10.1145\/3055004.3055016","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}