{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:15Z","timestamp":1773931155636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T00:00:00Z","timestamp":1526947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,22]]},"DOI":"10.1145\/3198458.3198465","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["SARA"],"prefix":"10.1145","author":[{"given":"Jean-Philippe","family":"Monteuuis","sequence":"first","affiliation":[{"name":"PSA Group &amp;Telecom ParisTech, Paris, France"}]},{"given":"Aymen","family":"Boudguiga","sequence":"additional","affiliation":[{"name":"CEA LIST, Gif-sur-Yvette, France"}]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Telecom ParisTech, Paris, France"}]},{"given":"Houda","family":"Labiod","sequence":"additional","affiliation":[{"name":"Telecom ParisTech, Paris, France"}]},{"given":"Alain","family":"Servel","sequence":"additional","affiliation":[{"name":"PSA Group, Velizy, France"}]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[{"name":"Telecom ParisTech, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2018,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems","author":"SAE On-Road Automated Vehicle Standards Committee and others.","year":"2016","unstructured":"SAE On-Road Automated Vehicle Standards Committee and others. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems , 2016 . SAE On-Road Automated Vehicle Standards Committee and others. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems, 2016."},{"key":"e_1_3_2_1_2_1","first-page":"2015","article-title":"Surveillance threat and mitigation","volume":"11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit , Djurrre Broekhuis , Michael Feiri , and Frank Kargl . Connected vehicles : Surveillance threat and mitigation . Black Hat Europe , 11 : 2015 , 2015 . Jonathan Petit, Djurrre Broekhuis, Michael Feiri, and Frank Kargl. Connected vehicles: Surveillance threat and mitigation. Black Hat Europe, 11:2015, 2015.","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_1_3_1","first-page":"2015","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . Remote exploitation of an unaltered passenger vehicle . Black Hat USA , 2015 , 2015 . Charlie Miller and Chris Valasek. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015, 2015.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Mobility and Security (NTMS), 2015 7th International Conference on","author":"Boudguiga Aymen","year":"2015","unstructured":"Aymen Boudguiga , Antoine Boulanger , Pascal Chiron , Witold Klaudel , Houda Labiod , and Jean-Christophe Seguy . Race : Risk analysis for cooperative engines. In New Technologies , Mobility and Security (NTMS), 2015 7th International Conference on , pages 1 -- 5 . IEEE, 2015 . Aymen Boudguiga, Antoine Boulanger, Pascal Chiron, Witold Klaudel, Houda Labiod, and Jean-Christophe Seguy. Race: Risk analysis for cooperative engines. In New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on, pages 1--5. IEEE, 2015."},{"key":"e_1_3_2_1_5_1","first-page":"641","volume-title":"2009 9th International Conference on","author":"Henniger Olaf","year":"2009","unstructured":"Olaf Henniger , Ludovic Apvrille , Andreas Fuchs , Yves Roudier , Alastair Ruddle , and Benjamin Weyl . Security requirements for automotive on-board networks. In Intelligent Transport Systems Telecommunications,(ITST) , 2009 9th International Conference on , pages 641 -- 646 . IEEE, 2009 . Olaf Henniger, Ludovic Apvrille, Andreas Fuchs, Yves Roudier, Alastair Ruddle, and Benjamin Weyl. Security requirements for automotive on-board networks. In Intelligent Transport Systems Telecommunications,(ITST), 2009 9th International Conference on, pages 641--646. IEEE, 2009."},{"key":"e_1_3_2_1_6_1","first-page":"2011","volume-title":"Methods and protocols","author":"TS ETSI.","year":"2011","unstructured":"TS ETSI. 102 165--1:\" telecommunications and internet converged services and protocols for advanced networking (tispan). Methods and protocols , pages 2011 -- 2003 , 2011 . TS ETSI. 102 165--1:\" telecommunications and internet converged services and protocols for advanced networking (tispan). Methods and protocols, pages 2011--03, 2011."},{"key":"e_1_3_2_1_7_1","first-page":"2017","volume-title":"Methods and protocols","author":"TS ETSI.","unstructured":"TS ETSI. 102 165--1:\" telecommunications and internet converged services and protocols for advanced networking (tispan). Methods and protocols , pages 2017 -- 2010 . TS ETSI. 102 165--1:\" telecommunications and internet converged services and protocols for advanced networking (tispan). Methods and protocols, pages 2017--10."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1834182.1834216"},{"key":"e_1_3_2_1_10_1","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit , Bas Stottelaar , Michael Feiri , and Frank Kargl . Remote attacks on automated vehicles sensors: Experiments on camera and lidar . Black Hat Europe , 11 : 2015 , 2015 . Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Europe, 11:2015, 2015.","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0017"},{"key":"e_1_3_2_1_12_1","volume-title":"Robust physical-world attacks on machine learning models. CoRR, abs\/1707.08945","author":"Evtimov Ivan","year":"2017","unstructured":"Ivan Evtimov , Kevin Eykholt , Earlence Fernandes , Tadayoshi Kohno , Bo Li , Atul Prakash , Amir Rahmati , and Dawn Song . Robust physical-world attacks on machine learning models. CoRR, abs\/1707.08945 , 2017 . Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. Robust physical-world attacks on machine learning models. CoRR, abs\/1707.08945, 2017."},{"key":"e_1_3_2_1_13_1","unstructured":"Ieee standard for wireless access in vehicular environments--security services for applications and management messages - amendment 1. IEEE Std 1609.2a-2017 (Amendment to IEEE Std 1609.2--2016) pages 1--123 Oct 2017.  Ieee standard for wireless access in vehicular environments--security services for applications and management messages - amendment 1. IEEE Std 1609.2a-2017 (Amendment to IEEE Std 1609.2--2016) pages 1--123 Oct 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899018"},{"key":"e_1_3_2_1_15_1","first-page":"26262","article-title":"Road vehicles-functional safety","author":"ISO.","year":"2011","unstructured":"ISO26262 ISO. 26262 : Road vehicles-functional safety . International Standard ISO\/FDIS , 26262 , 2011 . ISO26262 ISO. 26262: Road vehicles-functional safety. International Standard ISO\/FDIS, 26262, 2011.","journal-title":"International Standard ISO\/FDIS"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2012.6463997"},{"key":"e_1_3_2_1_17_1","first-page":"195","volume-title":"Automotive-Safety & Security","author":"Wolf Marko","year":"2012","unstructured":"Marko Wolf and Michael Scheibel . A systematic approach to a qualified security risk analysis for vehicular it systems . In Automotive-Safety & Security , pages 195 -- 210 , 2012 . Marko Wolf and Michael Scheibel. A systematic approach to a qualified security risk analysis for vehicular it systems. In Automotive-Safety & Security, pages 195--210, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Threat and risk assessment methodologies in the automotive domain. Procedia computer science, 83:1288--1294","author":"Macher Georg","year":"2016","unstructured":"Georg Macher , Eric Armengaud , Eugen Brenner , and Christian Kreiner . Threat and risk assessment methodologies in the automotive domain. Procedia computer science, 83:1288--1294 , 2016 . Georg Macher, Eric Armengaud, Eugen Brenner, and Christian Kreiner. Threat and risk assessment methodologies in the automotive domain. Procedia computer science, 83:1288--1294, 2016."},{"key":"e_1_3_2_1_19_1","volume-title":"The stride threat model. from the book writing secure code","author":"Howard Michael","year":"2002","unstructured":"Michael Howard and David LeBlanc . The stride threat model. from the book writing secure code , 2002 . Michael Howard and David LeBlanc. The stride threat model. from the book writing secure code, 2002."},{"key":"e_1_3_2_1_20_1","volume-title":"Pearson Education","author":"LeBlanc David","year":"2002","unstructured":"David LeBlanc and Michael Howard . Writing secure code . Pearson Education , 2002 . David LeBlanc and Michael Howard. Writing secure code. Pearson Education, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994499"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIVEC.2014.6953258"},{"key":"e_1_3_2_1_23_1","volume-title":"Common Criteria","author":"Criteria Common","year":"2017","unstructured":"Common Criteria . Common methodology for information technology security evaluation, evaluation methodology, v3.1, revision 5 . Common Criteria , 2017 . Common Criteria. Common methodology for information technology security evaluation, evaluation methodology, v3.1, revision 5. Common Criteria, 2017."},{"key":"e_1_3_2_1_24_1","volume-title":"Standard","author":"Security Information Technology","year":"2008","unstructured":"Information Technology - Security Techniques - Methodology for IT Security Evaluation . Standard , International Organization for Standardization , Geneva, CH , august 2008 . Information Technology - Security Techniques - Methodology for IT Security Evaluation. Standard, International Organization for Standardization, Geneva, CH, august 2008."},{"key":"e_1_3_2_1_25_1","volume-title":"Standard","author":"Information","year":"2009","unstructured":"Information technology -- Security techniques -- Evaluation criteria for IT security. Standard , International Organization for Standardization , Geneva, CH , august 2009 . Information technology -- Security techniques -- Evaluation criteria for IT security. Standard, International Organization for Standardization, Geneva, CH, august 2009."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2016.2627014"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407448"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"e_1_3_2_1_29_1","first-page":"68","volume-title":"MSDN Magazine-Louisville","author":"Hernan Shawn","year":"2006","unstructured":"Shawn Hernan , Scott Lambert , Tomasz Ostwald , and Adam Shostack . Threat modeling-uncover security design flaws using the stride approach . MSDN Magazine-Louisville , pages 68 -- 75 , 2006 . Shawn Hernan, Scott Lambert, Tomasz Ostwald, and Adam Shostack. Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville, pages 68--75, 2006."},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"2016 2nd International Workshop on","author":"Steger Marco","year":"2016","unstructured":"Marco Steger , Michael Karner , Joachim Hillebrand , Werner Rom , and Kay R\u00f6mer . A security metric for structured security analysis of cyber-physical systems supporting sae j3061. In Modelling, Analysis, and Control of Complex CPS (CPS Data) , 2016 2nd International Workshop on , pages 1 -- 6 . IEEE, 2016 . Marco Steger, Michael Karner, Joachim Hillebrand, Werner Rom, and Kay R\u00f6mer. A security metric for structured security analysis of cyber-physical systems supporting sae j3061. In Modelling, Analysis, and Control of Complex CPS (CPS Data), 2016 2nd International Workshop on, pages 1--6. IEEE, 2016."},{"key":"e_1_3_2_1_31_1","volume-title":"SAE International","author":"International SAE","year":"2016","unstructured":"SAE International . Cybersecurity guidebook for cyber-physical vehicle systems. Standard , SAE International , March 2016 . SAE International. Cybersecurity guidebook for cyber-physical vehicle systems. Standard, SAE International, March 2016."},{"key":"e_1_3_2_1_32_1","unstructured":"ISO. Road vehicles -- Functional safety 2011.  ISO. Road vehicles -- Functional safety 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-011-0038-9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-0108"},{"key":"e_1_3_2_1_35_1","first-page":"621","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE), 2015","author":"Macher Georg","year":"2015","unstructured":"Georg Macher , Harald Sporer , Reinhard Berlach , Eric Armengaud , and Christian Kreiner . Sahara : a security-aware hazard and risk analysis method. In Design , Automation & Test in Europe Conference & Exhibition (DATE), 2015 , pages 621 -- 624 . IEEE, 2015 . Georg Macher, Harald Sporer, Reinhard Berlach, Eric Armengaud, and Christian Kreiner. Sahara: a security-aware hazard and risk analysis method. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, pages 621--624. IEEE, 2015."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45480-1_13"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM Workshop on Cyber-Physical System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3198458.3198465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3198458.3198465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:24Z","timestamp":1750268964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3198458.3198465"}},"subtitle":["Security Automotive Risk Analysis Method"],"short-title":[],"issued":{"date-parts":[[2018,5,22]]},"references-count":36,"alternative-id":["10.1145\/3198458.3198465","10.1145\/3198458"],"URL":"https:\/\/doi.org\/10.1145\/3198458.3198465","relation":{},"subject":[],"published":{"date-parts":[[2018,5,22]]},"assertion":[{"value":"2018-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}