{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:40Z","timestamp":1775744980356,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230843","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["ATG"],"prefix":"10.1145","author":[{"given":"Tianxiang","family":"Huang","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, China"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Andrei","family":"Bytes","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_2_1","unstructured":"Miller C Valasek C. 2014. A survey of remote automotive attack surfaces. Black Hat USA.  Miller C Valasek C. 2014. A survey of remote automotive attack surfaces. Black Hat USA."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE 11th International Conference on. IEEE","author":"Wang Y","year":"2015","unstructured":"Wang Y , Hong Z , Li J. 2015 . Challenges and future trends for embedded security in electric vehicular communications. ASIC (ASICON) , IEEE 11th International Conference on. IEEE , (2015), 1--4. Wang Y, Hong Z, Li J. 2015. Challenges and future trends for embedded security in electric vehicular communications. ASIC (ASICON), IEEE 11th International Conference on. IEEE, (2015), 1--4."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"e_1_3_2_1_5_1","volume-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. USENIX Security Symposium, 911--927","author":"Cho K T","year":"2016","unstructured":"Cho K T , Shin K G . 2016 . Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. USENIX Security Symposium, 911--927 . Cho K T, Shin K G. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. USENIX Security Symposium, 911--927."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Embedded Security in Cars Conference.","author":"Borazjani P","year":"2014","unstructured":"Borazjani P , Everett C , McCoy D. 2014 . OCTANE: An extensible open source car security testbed , Proceedings of the Embedded Security in Cars Conference. Borazjani P, Everett C, McCoy D. 2014. OCTANE: An extensible open source car security testbed, Proceedings of the Embedded Security in Cars Conference."},{"key":"e_1_3_2_1_8_1","unstructured":"Michael J Shkatov M Bazhaniuk O 2017 Driving down the rabbit hole. In DefCon 25.  Michael J Shkatov M Bazhaniuk O 2017 Driving down the rabbit hole. In DefCon 25."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_38"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49806-5_2"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE 29th International Conference on. IEEE","author":"Lee H","year":"2015","unstructured":"Lee H , Choi K , Chung K , 2015. Fuzzing can packets into automobiles. Advanced Information Networking and Applications (AINA) , IEEE 29th International Conference on. IEEE , ( 2015 ), 817--821. Lee H, Choi K, Chung K, et al. 2015. Fuzzing can packets into automobiles. Advanced Information Networking and Applications (AINA), IEEE 29th International Conference on. IEEE, (2015), 817--821."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_27"},{"key":"e_1_3_2_1_14_1","unstructured":"Yang F. 2009. A bus off case of can error passive transmitter. EDN Technical paper.  Yang F. 2009. A bus off case of can error passive transmitter. EDN Technical paper."},{"key":"e_1_3_2_1_15_1","unstructured":"Python-can lib https:\/\/pypi.python.org\/pypi\/python-can\/2.0.0b1.  Python-can lib https:\/\/pypi.python.org\/pypi\/python-can\/2.0.0b1."},{"key":"e_1_3_2_1_16_1","unstructured":"Car-Hacking Dataset for the intrusion detection http:\/\/ocslab.hksecurity.net\/Datasets\/CAN-intrusion-dataset  Car-Hacking Dataset for the intrusion detection http:\/\/ocslab.hksecurity.net\/Datasets\/CAN-intrusion-dataset"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Kang M J Kang J W. 2016. Intrusion detection system using deep neural network for in-vehicle network security. PloS one (2016) 11(6): e0155781.  Kang M J Kang J W. 2016. Intrusion detection system using deep neural network for in-vehicle network security. PloS one (2016) 11(6): e0155781.","DOI":"10.1371\/journal.pone.0155781"},{"key":"e_1_3_2_1_18_1","volume-title":"IEEE International Conference on. IEEE","author":"Taylor A","year":"2016","unstructured":"Taylor A , Leblanc S , Japkowicz N. 2016 , Anomaly detection in automobile control network data with long short-term memory networks. Data Science and Advanced Analytics (DSAA) , IEEE International Conference on. IEEE , (2016), 130--139. Taylor A, Leblanc S, Japkowicz N. 2016, Anomaly detection in automobile control network data with long short-term memory networks. Data Science and Advanced Analytics (DSAA), IEEE International Conference on. IEEE, (2016), 130--139."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744907"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:30Z","timestamp":1750208250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230843"}},"subtitle":["An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":19,"alternative-id":["10.1145\/3230833.3230843","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230843","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}