{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:09:22Z","timestamp":1763017762437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T00:00:00Z","timestamp":1497744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,18]]},"DOI":"10.1145\/3061639.3072952","type":"proceedings-article","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T12:18:42Z","timestamp":1497356322000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Extensibility in Automotive Security"],"prefix":"10.1145","author":[{"given":"Sandip","family":"Ray","sequence":"first","affiliation":[{"name":"NXP Semiconductors, Austin, TX, USA"}]},{"given":"Wen","family":"Chen","sequence":"additional","affiliation":[{"name":"NXP Semiconductors, Austin, TX, USA"}]},{"given":"Jayanta","family":"Bhadra","sequence":"additional","affiliation":[{"name":"NXP Semiconductors, Austin, TX, USA"}]},{"given":"Mohammad Abdullah","family":"Al Faruque","sequence":"additional","affiliation":[{"name":"University of California at Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CHES 2002","author":"Agrawal D.","year":"2002","unstructured":"D. Agrawal , B. Archambeault , J. R. Rao , and P. Rohatgi . The em side---channel(s). In B. S. Kaliski, \u00e7. K. Ko\u00e7, and C. Paar, editors , CHES 2002 , 2002 . D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The em side---channel(s). In B. S. Kaliski, \u00e7. K. Ko\u00e7, and C. Paar, editors, CHES 2002, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984483"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2840819.2840894"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898020"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"USENIX Security","volume":"5","author":"Bono S.","year":"2005","unstructured":"S. Bono , M. Green , A. Stubblefield , A. Juels , A. D. Rubin , and M. Szydlo . Security analysis of a cryptographically-enabled rfid device . In USENIX Security , volume 5 , pages 1 -- 16 , 2005 . S. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled rfid device. In USENIX Security, volume 5, pages 1--16, 2005."},{"key":"e_1_3_2_1_6_1","unstructured":"D. Clare S. Fry H. Handschuh H. Patil C. Poulin A. Wasicek R. Wood D. Brown G. Cooper I. Gilvarry D. Grawrock A. Rajan A. Tatourian R. Venugopalan C. Vishik D. Wheelere and M. Zhao. Automotive Security Best Practices: Recommendations for Security and Privacy in the Era of the Next-generation Car. Technical report McAfee and Intel.  D. Clare S. Fry H. Handschuh H. Patil C. Poulin A. Wasicek R. Wood D. Brown G. Cooper I. Gilvarry D. Grawrock A. Rajan A. Tatourian R. Venugopalan C. Vishik D. Wheelere and M. Zhao. Automotive Security Best Practices: Recommendations for Security and Privacy in the Era of the Next-generation Car. Technical report McAfee and Intel."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Condliffe. A $60 hack can fool the lidar sensors used on most self-driving cars 2015.  J. Condliffe. A $60 hack can fool the lidar sensors used on most self-driving cars 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"Relay attacks on passive keyless entry and start systems in modern cars. In 18TH Annual Network and Distributed System Security Symposium","author":"Francillon A.","year":"2011","unstructured":"A. Francillon , B. Danev , and S. Capkun . Relay attacks on passive keyless entry and start systems in modern cars. In 18TH Annual Network and Distributed System Security Symposium , 2011 . A. Francillon, B. Danev, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In 18TH Annual Network and Distributed System Security Symposium, 2011."},{"key":"e_1_3_2_1_9_1","first-page":"56","volume-title":"Proceedings of the ION GNSS international technical meeting of the satellite division","volume":"55","author":"Humphreys T. E.","year":"2008","unstructured":"T. E. Humphreys , B. M. Ledvina , M. L. Psiaki , B. W. O\u00e2\u0102 &Zacute;Hanlon, and P. M. Kintner Jr . Assessing the spoofing threat: Development of a portable gps civilian spoofer . In Proceedings of the ION GNSS international technical meeting of the satellite division , volume 55 , page 56 , 2008 . T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O\u00e2\u0102&Zacute;Hanlon, and P. M. Kintner Jr. Assessing the spoofing threat: Development of a portable gps civilian spoofer. In Proceedings of the ION GNSS international technical meeting of the satellite division, volume 55, page 56, 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"Intel. Car of the Future -- Automotive Safety and Security Trends. http:\/\/www.intel.com\/content\/www\/us\/en\/automotive\/automotive-security-best-practices-white-paper.html.  Intel. Car of the Future -- Automotive Safety and Security Trends. http:\/\/www.intel.com\/content\/www\/us\/en\/automotive\/automotive-security-best-practices-white-paper.html."},{"key":"e_1_3_2_1_11_1","first-page":"11","volume-title":"19th USENIX Security Symposium, Washington DC","author":"Ishtiaq Roufa R. M.","year":"2010","unstructured":"R. M. Ishtiaq Roufa , H. Mustafaa , S. O. Travis Taylora , W. Xua , M. Gruteserb , W. Trappeb , and I. Seskarb . Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study . 19th USENIX Security Symposium, Washington DC , pages 11 -- 13 , 2010 . R. M. Ishtiaq Roufa, H. Mustafaa, S. O. Travis Taylora, W. Xua, M. Gruteserb, W. Trappeb, and I. Seskarb. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. 19th USENIX Security Symposium, Washington DC, pages 11--13, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_13_1","volume-title":"Study: Some mobile devices can be hacked using sound waves","author":"McGee M. K.","year":"2017","unstructured":"M. K. McGee . Study: Some mobile devices can be hacked using sound waves , 2017 . M. K. McGee. Study: Some mobile devices can be hacked using sound waves, 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"Black Hat USA","author":"Miller C.","year":"2011","unstructured":"C. Miller . Battery firmware hacking: Inside the innards of a smart battery . Black Hat USA , 2011 . C. Miller. Battery firmware hacking: Inside the innards of a smart battery. Black Hat USA, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"BlackHat USA","author":"Miller C.","year":"2015","unstructured":"C. Miller and C. Valasek . Remote Exploitation of an Unaltered Passenger Vehicle . In BlackHat USA , 2015 . C. Miller and C. Valasek. Remote Exploitation of an Unaltered Passenger Vehicle. In BlackHat USA, 2015."},{"key":"e_1_3_2_1_16_1","unstructured":"National Highway Traffic Safety Association. Motor Vehicles Recall. See URL: https:\/\/www.recalls.gov\/nhtsa.html.  National Highway Traffic Safety Association. Motor Vehicles Recall. See URL: https:\/\/www.recalls.gov\/nhtsa.html."},{"key":"e_1_3_2_1_17_1","unstructured":"NXP Semiconductors. http:\/\/www.nxp.com\/assets\/documents\/data\/en\/white-papers\/MULTI-LAYER-VEHICLE-SECURITY-WP.pdf.  NXP Semiconductors. http:\/\/www.nxp.com\/assets\/documents\/data\/en\/white-papers\/MULTI-LAYER-VEHICLE-SECURITY-WP.pdf."},{"key":"e_1_3_2_1_18_1","volume-title":"Protecting gps from spoofers is critical to the future of navigation","author":"Psiaki M.","year":"2016","unstructured":"M. Psiaki and T. Humphreys . Protecting gps from spoofers is critical to the future of navigation , 2016 . M. Psiaki and T. Humphreys. Protecting gps from spoofers is critical to the future of navigation, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2526612"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2754896"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2485288.2485398"},{"key":"e_1_3_2_1_22_1","volume-title":"Automotive and Industrial Data Security. In Cybersecurity and Cyber-physical Systems Workshop","author":"Weimerkirsch A.","year":"2012","unstructured":"A. Weimerkirsch . Automotive and Industrial Data Security. In Cybersecurity and Cyber-physical Systems Workshop , 2012 . A. Weimerkirsch. Automotive and Industrial Data Security. In Cybersecurity and Cyber-physical Systems Workshop, 2012."},{"key":"e_1_3_2_1_23_1","volume-title":"Gogoro scooter and battery swap distribution model get smarter and spread to new cities","author":"Weintraub S.","year":"2016","unstructured":"S. Weintraub . Gogoro scooter and battery swap distribution model get smarter and spread to new cities , 2016 . S. Weintraub. Gogoro scooter and battery swap distribution model get smarter and spread to new cities, 2016."}],"event":{"name":"DAC '17: The 54th Annual Design Automation Conference 2017","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Austin TX USA","acronym":"DAC '17"},"container-title":["Proceedings of the 54th Annual Design Automation Conference 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3072952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3061639.3072952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:26Z","timestamp":1750215806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3072952"}},"subtitle":["Current Practice and Challenges: Invited"],"short-title":[],"issued":{"date-parts":[[2017,6,18]]},"references-count":23,"alternative-id":["10.1145\/3061639.3072952","10.1145\/3061639"],"URL":"https:\/\/doi.org\/10.1145\/3061639.3072952","relation":{},"subject":[],"published":{"date-parts":[[2017,6,18]]},"assertion":[{"value":"2017-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}