{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:24:48Z","timestamp":1774542288288,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003130","name":"Fonds Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Fund KU Leuven"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134623","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"225-237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["VulCAN"],"prefix":"10.1145","author":[{"given":"Jo","family":"Van Bulck","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]},{"given":"Jan Tobias","family":"M\u00fchlberg","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AUTOSAR Specification 4.3. 2016. Specification of module secure onboard communication. https:\/\/www.autosar.org\/standards\/classic-platform\/release-43\/software-architecture\/safety-and-security\/. (2016).  AUTOSAR Specification 4.3. 2016. Specification of module secure onboard communication. https:\/\/www.autosar.org\/standards\/classic-platform\/release-43\/software-architecture\/safety-and-security\/. (2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1970.11992600"},{"key":"e_1_3_2_1_3_1","volume-title":"TrustZone: Integrated hardware and software security. ARM white paper 3, 4","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves and Don Felton . 2004. TrustZone: Integrated hardware and software security. ARM white paper 3, 4 ( 2004 ), 18--24. Tiago Alves and Don Felton. 2004. TrustZone: Integrated hardware and software security. ARM white paper 3, 4 (2004), 18--24."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.196"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_7_1","volume-title":"Formal security analysis of the MaCAN protocol","author":"Bruni Alessandro","unstructured":"Alessandro Bruni , Michal Sojka , Flemming Nielson , and Hanne Riis Nielson . 2014. Formal security analysis of the MaCAN protocol . Springer International Publishing , Cham , 241--255. Alessandro Bruni, Michal Sojka, Flemming Nielson, and Hanne Riis Nielson. 2014. Formal security analysis of the MaCAN protocol. Springer International Publishing, Cham, 241--255."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , Tadayoshi Kohno , 2011 . Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security Symposium . San Francisco. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. San Francisco."},{"key":"e_1_3_2_1_11_1","volume-title":"19th Annual Network and Distributed System Security Symposium (NDSS '12)","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy , Aur\u00e9lien Francillon , Daniele Perito , and Gene Tsudik . 2012 . SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust . In 19th Annual Network and Distributed System Security Symposium (NDSS '12) . Karim Eldefrawy, Aur\u00e9lien Francillon, Daniele Perito, and Gene Tsudik. 2012. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium (NDSS '12)."},{"key":"e_1_3_2_1_12_1","volume-title":"ESORICS '17 (LNCS)","author":"Fr\u00f6schle Sibylle","unstructured":"Sibylle Fr\u00f6schle and Alexander St\u00fchring . 2017. Analyzing the capabilities of the CAN attacker . In ESORICS '17 (LNCS) , Vol. 10492 . Springer , Heidelberg , 464--482. Sibylle Fr\u00f6schle and Alexander St\u00fchring. 2017. Analyzing the capabilities of the CAN attacker. In ESORICS '17 (LNCS), Vol. 10492. Springer, Heidelberg, 464--482."},{"key":"e_1_3_2_1_13_1","unstructured":"Olivier Girard. 2009. openMSP430 -- a synthesizable 16bit microcontroller core written in Verilog. https:\/\/opencores.org\/project openmsp430. (2009).  Olivier Girard. 2009. openMSP430 -- a synthesizable 16bit microcontroller core written in Verilog. https:\/\/opencores.org\/project openmsp430. (2009)."},{"key":"e_1_3_2_1_14_1","unstructured":"Vector Informatik GmbH. 2017. MICROSAR -- AUTOSAR basic software and RTE. https:\/\/vector.com\/vi_microsar_en.html. (2017).  Vector Informatik GmbH. 2017. MICROSAR -- AUTOSAR basic software and RTE. https:\/\/vector.com\/vi_microsar_en.html. (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"e_1_3_2_1_16_1","volume-title":"Escar Conference","author":"Hartkopp Oliver","unstructured":"Oliver Hartkopp , C. Reuber , and R. Schilling . 2012. MaCAN: Message authenticated CAN . In Escar Conference , Berlin, Germany. Oliver Hartkopp, C. Reuber, and R. Schilling. 2012. MaCAN: Message authenticated CAN. In Escar Conference, Berlin, Germany."},{"key":"e_1_3_2_1_17_1","volume-title":"Fahmy","author":"Hazem Ahmed","year":"2012","unstructured":"Ahmed Hazem and Hossam A.H . Fahmy . 2012 . LCAP : A lightweight CAN authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany , Vol. 6 . Ahmed Hazem and Hossam A.H. Fahmy. 2012. LCAP: A lightweight CAN authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, Vol. 6."},{"key":"e_1_3_2_1_18_1","volume-title":"9th International Conference on Intelligent Transport Systems Telecommunications, (ITST). 641--646","author":"Henniger O.","unstructured":"O. Henniger , L. Apvrille , A. Fuchs , Y. Roudier , A. Ruddle , and B. Weyl . 2009. Security requirements for automotive on-board networks . In 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST). 641--646 . O. Henniger, L. Apvrille, A. Fuchs, Y. Roudier, A. Ruddle, and B. Weyl. 2009. Security requirements for automotive on-board networks. In 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST). 641--646."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_20_1","unstructured":"GlobalPlatform Inc. 2011. The trusted execution environment: Delivering enhanced security at a lower cost to the mobile market. https:\/\/www.globalplatform.org\/documents\/GlobalPlatform_TEE_White_Paper_Feb2011.pdf. (2011).  GlobalPlatform Inc. 2011. The trusted execution environment: Delivering enhanced security at a lower cost to the mobile market. https:\/\/www.globalplatform.org\/documents\/GlobalPlatform_TEE_White_Paper_Feb2011.pdf. (2011)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_23_1","volume-title":"14th Int. Conf. on Embedded Security in Cars (ESCAR '14)","author":"Kurachi R","year":"2014","unstructured":"R Kurachi , Y Matsubara , H Takada , N Adachi , Y Miyashita , and S Horihata . 2014 . CaCAN -- centralized authentication system in CAN . In 14th Int. Conf. on Embedded Security in Cars (ESCAR '14) . R Kurachi, Y Matsubara, H Takada, N Adachi, Y Miyashita, and S Horihata. 2014. CaCAN -- centralized authentication system in CAN. In 14th Int. Conf. on Embedded Security in Cars (ESCAR '14)."},{"key":"e_1_3_2_1_24_1","unstructured":"P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 99 (2017).  P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 99 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/2315408"},{"key":"e_1_3_2_1_27_1","volume-title":"A survey of remote automotive attack surfaces. Black Hat USA","author":"Miller Charlie","year":"2014","unstructured":"Charlie Miller and Chris Valasek . 2014. A survey of remote automotive attack surfaces. Black Hat USA ( 2014 ). Charlie Miller and Chris Valasek. 2014. A survey of remote automotive attack surfaces. Black Hat USA (2014)."},{"key":"e_1_3_2_1_28_1","volume-title":"Remote exploitation of an unaltered passenger vehicle. Black Hat USA","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA ( 2015 ). Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)."},{"key":"e_1_3_2_1_29_1","volume-title":"Bart Preneel, and Frank Piessens.","author":"M\u00fchlberg Jan Tobias","year":"2016","unstructured":"Jan Tobias M\u00fchlberg , Sara Cleemput , Mustafa A. Mustafa , Jo Van Bulck , Bart Preneel, and Frank Piessens. 2016 . An implementation of a high assurance smart meter using protected module architectures. In WISTP '16 (LNCS), Vol. 9895 . Springer , Heidelberg, 53--69. Jan Tobias M\u00fchlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, and Frank Piessens. 2016. An implementation of a high assurance smart meter using protected module architectures. In WISTP '16 (LNCS), Vol. 9895. Springer, Heidelberg, 53--69."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_26"},{"key":"e_1_3_2_1_31_1","volume-title":"22nd USENIX Security symposium. USENIX Association, 479--494","author":"Noorman Job","year":"2013","unstructured":"Job Noorman , Pieter Agten , Wilfried Daniels , Raoul Strackx , Anthony Van Herrewege , Christophe Huygens , Bart Preneel , Ingrid Verbauwhede , and Frank Piessens . 2013 . Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base . In 22nd USENIX Security symposium. USENIX Association, 479--494 . Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd USENIX Security symposium. USENIX Association, 479--494."},{"key":"e_1_3_2_1_32_1","volume-title":"Jan Tobias M\u00fchlberg, and Frank Piessens","author":"Noorman Job","year":"2017","unstructured":"Job Noorman , Jan Tobias M\u00fchlberg, and Frank Piessens . 2017 . Authentic execution of distributed event-driven applications with a small TCB. In STM '17 (LNCS), Vol. 10547 . Springer , Heidelberg, 55--71. Job Noorman, Jan Tobias M\u00fchlberg, and Frank Piessens. 2017. Authentic execution of distributed event-driven applications with a small TCB. In STM '17 (LNCS), Vol. 10547. Springer, Heidelberg, 55--71."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"e_1_3_2_1_34_1","volume-title":"USA","author":"N\u00fcrnberger Stefan","year":"2016","unstructured":"Stefan N\u00fcrnberger and Christian Rossow . 2016 . -- vatiCAN -- Vetted, authenticated CAN bus. In Cryptographic Hardware and Embedded Systems -- CHES '16: 18th International Conference, Santa Barbara, CA , USA , August 17-19, 2016, Proceedings. Springer Berlin Heidelberg, Berlin, Heidelberg, 106--124. Stefan N\u00fcrnberger and Christian Rossow. 2016. -- vatiCAN -- Vetted, authenticated CAN bus. In Cryptographic Hardware and Embedded Systems -- CHES '16: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Springer Berlin Heidelberg, Berlin, Heidelberg, 106--124."},{"key":"e_1_3_2_1_35_1","volume-title":"IEEE GLOBECOM '08-2008 IEEE Global Telecommunications Conference. 1--6.","author":"Oguma H.","unstructured":"H. Oguma , A. Yoshioka , M. Nishikawa , R. Shigetomi , A. Otsuka , and H. Imai . 2008. New attestation based security architecture for in-vehicle communication . In IEEE GLOBECOM '08-2008 IEEE Global Telecommunications Conference. 1--6. H. Oguma, A. Yoshioka, M. Nishikawa, R. Shigetomi, A. Otsuka, and H. Imai. 2008. New attestation based security architecture for in-vehicle communication. In IEEE GLOBECOM '08-2008 IEEE Global Telecommunications Conference. 1--6."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699503"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.01.006"},{"key":"e_1_3_2_1_38_1","volume-title":"Heraklion, Greece","author":"Radu Andreea-Ina","year":"2016","unstructured":"Andreea-Ina Radu and Flavio D. Garcia . 2016. LeiA: A lightweight authentication protocol for CAN. In Computer Security -- ESORICS '16: 21st European Symposium on Research in Computer Security , Heraklion, Greece , September 26-30, 2016 , Proceedings, Part II. Springer International Publishing, Cham, 283--300. Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A lightweight authentication protocol for CAN. In Computer Security -- ESORICS '16: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Springer International Publishing, Cham, 283--300."},{"key":"e_1_3_2_1_39_1","volume-title":"CyberICPS '17 (LNCS)","author":"Raes Vincent","unstructured":"Vincent Raes and Vincent Naessens . 2017. Development of an embedded platform for secure CPS services . In CyberICPS '17 (LNCS) . Springer, Heidelberg . In press . Vincent Raes and Vincent Naessens. 2017. Development of an embedded platform for secure CPS services. In CyberICPS '17 (LNCS). Springer, Heidelberg. In press."},{"key":"e_1_3_2_1_40_1","unstructured":"SAE International. 2016. J3061: Cybersecurity guidebook for cyber-physical vehicle systems. (2016). http:\/\/standards.sae.org\/j3061_201601\/.  SAE International. 2016. J3061: Cybersecurity guidebook for cyber-physical vehicle systems. (2016). http:\/\/standards.sae.org\/j3061_201601\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Seeed Studio. 2017. CAN BUS shield driver for Arduino\/Seeeduino. https:\/\/github.com\/Seeed-Studio\/CAN_BUS_Shield. (2017).  Seeed Studio. 2017. CAN BUS shield driver for Arduino\/Seeeduino. https:\/\/github.com\/Seeed-Studio\/CAN_BUS_Shield. (2017)."},{"key":"e_1_3_2_1_42_1","volume-title":"Securing Electronic Business Processes","author":"Strackx Raoul","unstructured":"Raoul Strackx , Job Noorman , Ingrid Verbauwhede , Bart Preneel , and Frank Piessens . 2013. Protected software module architectures . In Securing Electronic Business Processes . Springer , 241--251. Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, and Frank Piessens. 2013. Protected software module architectures. In Securing Electronic Business Processes. Springer, 241--251."},{"key":"e_1_3_2_1_43_1","volume-title":"Security and Privacy in Communication Networks","author":"Strackx Raoul","unstructured":"Raoul Strackx , Frank Piessens , and Bart Preneel . 2010. Efficient isolation of trusted subsystems in embedded systems . In Security and Privacy in Communication Networks . Springer , 344--361. Raoul Strackx, Frank Piessens, and Bart Preneel. 2010. Efficient isolation of trusted subsystems in embedded systems. In Security and Privacy in Communication Networks. Springer, 344--361."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24018-3_5"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892664.2892693"},{"key":"e_1_3_2_1_46_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth -- a simple, backward compatible broadcast authentication protocol for CAN bus . In ECRYPT Workshop on Lightweight Cryptography , Vol. 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth -- a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography, Vol. 2011."},{"key":"e_1_3_2_1_47_1","unstructured":"David A Wheeler. 2004. SLOCCount. https:\/\/www.dwheeler.com\/sloccount\/. (2004).  David A Wheeler. 2004. SLOCCount. https:\/\/www.dwheeler.com\/sloccount\/. (2004)."},{"key":"e_1_3_2_1_48_1","volume-title":"STM '17 (LNCS)","author":"Whitefield Jorden","unstructured":"Jorden Whitefield , Liqun Chen , Frank Kargl , Andrew Paverd , Steve Schneider , Helen Treharne , and Stephan Wesemeyer . 2017. Formal analysis of V2X revocation protocols . In STM '17 (LNCS) , Vol. 10547 . Springer , Heidelberg , 147--163. Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, and Stephan Wesemeyer. 2017. Formal analysis of V2X revocation protocols. In STM '17 (LNCS), Vol. 10547. Springer, Heidelberg, 147--163."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"e_1_3_2_1_50_1","volume-title":"Workshop on Embedded Security in Cars.","author":"Wolf Marko","year":"2004","unstructured":"Marko Wolf , Andr\u00e9 Weimerskirch , and Christof Paar . 2004 . Security in automotive bus systems . In Workshop on Embedded Security in Cars. Marko Wolf, Andr\u00e9 Weimerskirch, and Christof Paar. 2004. Security in automotive bus systems. In Workshop on Embedded Security in Cars."},{"key":"e_1_3_2_1_51_1","volume-title":"Automation Test in Europe Conference Exhibition. 1088--1093","author":"Ziermann T.","unstructured":"T. Ziermann , S. Wildermann , and J. Teich . 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In 2009 Design , Automation Test in Europe Conference Exhibition. 1088--1093 . T. Ziermann, S. Wildermann, and J. Teich. 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In 2009 Design, Automation Test in Europe Conference Exhibition. 1088--1093."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134623"}},"subtitle":["Efficient Component Authentication and Software Isolation for Automotive Control Networks"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":51,"alternative-id":["10.1145\/3134600.3134623","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134623","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}