{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:37Z","timestamp":1750306237230,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3055378.3055382","type":"proceedings-article","created":{"date-parts":[[2017,4,14]],"date-time":"2017-04-14T12:18:54Z","timestamp":1492172334000},"page":"19-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Using ID-Hopping to Defend Against Targeted DoS on CAN"],"prefix":"10.1145","author":[{"given":"Abdulmalik","family":"Humayed","sequence":"first","affiliation":[{"name":"University of Kansas, Lawrence, Kansas"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, Kansas"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , and Tadayoshi Kohno . 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium , San Francisco, CA, USA , August 8-12, 2011, Proceedings. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Checkoway.pdf Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Checkoway.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"NSF Workshop on Cyber-Physical Systems. 1--3.","author":"Cook Jeffrey","year":"2006","unstructured":"Jeffrey Cook . 2006 . Cyber-physical systems and the twenty-first century automobile . In NSF Workshop on Cyber-Physical Systems. 1--3. Jeffrey Cook. 2006. Cyber-physical systems and the twenty-first century automobile. In NSF Workshop on Cyber-Physical Systems. 1--3."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/LES.2013.2264594"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2502524.2502546"},{"key":"e_1_3_2_1_5_1","first-page":"22","article-title":"Automotive Cyber-security for In-Vehicle Communication","volume":"6","author":"Han Kyusuk","year":"2014","unstructured":"Kyusuk Han , Andr\u00e9 Weimerskirch , and Kang G Shin . 2014 . Automotive Cyber-security for In-Vehicle Communication . In IQT QUARTERLY , Vol. 6. 22 -- 25 . Kyusuk Han, Andr\u00e9 Weimerskirch, and Kang G Shin. 2014. Automotive Cyber-security for In-Vehicle Communication. In IQT QUARTERLY, Vol. 6. 22--25.","journal-title":"IQT QUARTERLY"},{"unstructured":"Tobias Hoppe Stefan Kiltz and Jana Dittmann. 2008. Security Threats to Automotive CAN Networks --- Practical Examples and Selected Short-Term Counter-measures. In SAFECOMP.  Tobias Hoppe Stefan Kiltz and Jana Dittmann. 2008. Security Threats to Automotive CAN Networks --- Practical Examples and Selected Short-Term Counter-measures. In SAFECOMP.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2735960.2735992"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 13th International CAN Conference (iCC","author":"Kleine-Budde M","year":"2012","unstructured":"M Kleine-Budde . 2012 . SocketCAN-The official CAN API of the Linux kernel . In Proceedings of the 13th International CAN Conference (iCC 2012), Hambach Castle, Germany CiA. 05--17. M Kleine-Budde. 2012. SocketCAN-The official CAN API of the Linux kernel. In Proceedings of the 13th International CAN Conference (iCC 2012), Hambach Castle, Germany CiA. 05--17."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/SP.2010.34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/IVS.2008.4621263"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.2991\/citcs.2012.161"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2831232"},{"key":"e_1_3_2_1_13_1","volume-title":"Adventures in Automotive Networks and Control Units. A SANS Whitepaper. (August","author":"Miller Charlie","year":"2013","unstructured":"Charlie Miller and Chris Valasek . 2013. Adventures in Automotive Networks and Control Units. A SANS Whitepaper. (August 2013 ). http:\/\/illmatics.com\/car_hacking.pdf Charlie Miller and Chris Valasek. 2013. Adventures in Automotive Networks and Control Units. A SANS Whitepaper. (August 2013). http:\/\/illmatics.com\/car_hacking.pdf"},{"key":"e_1_3_2_1_14_1","volume-title":"Remote exploitation of an unaltered passenger vehicle. Black Hat USA","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA ( 2015 ). Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/IVS.2011.5940552"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ISIAS.2010.5604050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/GLOCOM.2008.ECP.369"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.7873\/DATE.2013.102"},{"key":"e_1_3_2_1_21_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus . In ECRYPT Workshop on Lightweight Cryptography , Vol. 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography, Vol. 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/IOT.2014.7030108"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"e_1_3_2_1_24_1","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN. Intelligent Transportation Systems","volume":"16","author":"Woo Samuel","year":"2015","unstructured":"Samuel Woo , Hyo Jin Jo , and Dong Hoon Lee . 2015 . A practical wireless attack on the connected car and security protocol for in-vehicle CAN. Intelligent Transportation Systems , IEEE Transactions on 16 , 2 (2015), 993 -- 1006 . Samuel Woo, Hyo Jin Jo, and Dong Hoon Lee. 2015. A practical wireless attack on the connected car and security protocol for in-vehicle CAN. Intelligent Transportation Systems, IEEE Transactions on 16, 2 (2015), 993--1006.","journal-title":"IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/DATE.2009.5090826"}],"event":{"sponsor":["IEEE Signal Processing Society","SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"],"acronym":"CPS Week '17","name":"CPS Week '17: Cyber Physical Systems Week 2017","location":"Pittsburgh PA USA"},"container-title":["Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055378.3055382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055378.3055382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:26Z","timestamp":1750220606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055378.3055382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":23,"alternative-id":["10.1145\/3055378.3055382","10.1145\/3055378"],"URL":"https:\/\/doi.org\/10.1145\/3055378.3055382","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}