{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:08:13Z","timestamp":1757779693960,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1739577"],"award-info":[{"award-number":["1739577"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3300061.3300126","type":"proceedings-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T13:20:41Z","timestamp":1565011241000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Diagnosing Vehicles with Automotive Batteries"],"prefix":"10.1145","author":[{"given":"Liang","family":"He","sequence":"first","affiliation":[{"name":"University of Colorado Denver, Denver, CO, USA"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Ziyang","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yuanchao","family":"Shu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, China"}]},{"given":"Cong","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Car Software: 100M Lines of Code and Counting. https:\/\/www.linkedin.com\/pulse\/20140626152045--3625632-carsoftware- 100m-lines-of-code-and-counting.  Car Software: 100M Lines of Code and Counting. https:\/\/www.linkedin.com\/pulse\/20140626152045--3625632-carsoftware- 100m-lines-of-code-and-counting."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735977"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"e_1_3_2_1_6_1","unstructured":"BMW cars found to contain more than a dozen flaws. http:\/\/www.bbc.com\/news\/technology-44224794.  BMW cars found to contain more than a dozen flaws. http:\/\/www.bbc.com\/news\/technology-44224794."},{"key":"e_1_3_2_1_7_1","unstructured":"Software Glitches in the Auto Industry and What that Means for You. https:\/\/www.proservicescorp.com\/auto-industry-software-glitches\/.  Software Glitches in the Auto Industry and What that Means for You. https:\/\/www.proservicescorp.com\/auto-industry-software-glitches\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Study: Tesla Jaguar highest in auto software defects. https:\/\/www.usatoday.com\/story\/money\/cars\/2016\/05\/24\/jd-powersoftware- defects-tesla-motors-jaguar-land-rover\/84841174\/.  Study: Tesla Jaguar highest in auto software defects. https:\/\/www.usatoday.com\/story\/money\/cars\/2016\/05\/24\/jd-powersoftware- defects-tesla-motors-jaguar-land-rover\/84841174\/."},{"key":"e_1_3_2_1_9_1","unstructured":"CAN Bus. https:\/\/www.csselectronics.com\/screen\/page\/simple-introto- can-bus\/language\/en.  CAN Bus. https:\/\/www.csselectronics.com\/screen\/page\/simple-introto- can-bus\/language\/en."},{"key":"e_1_3_2_1_10_1","unstructured":"Toyota vehicle recalls. https:\/\/en.wikipedia.org\/wiki\/2009%E2%80%9311_Toyota_vehicle_recalls.  Toyota vehicle recalls. https:\/\/en.wikipedia.org\/wiki\/2009%E2%80%9311_Toyota_vehicle_recalls."},{"key":"e_1_3_2_1_11_1","unstructured":"Jaguar recall shows how software glitches are the new speed bump. http:\/\/fortune.com\/2015\/07\/13\/jaguar-recall-software-glitch\/.  Jaguar recall shows how software glitches are the new speed bump. http:\/\/fortune.com\/2015\/07\/13\/jaguar-recall-software-glitch\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Fiat Chrysler recalls 4.8 million vehicles that could get stuck in cruise control. http:\/\/money.cnn.com\/2018\/05\/25\/autos\/fca-recall-cruisecontrol\/ index.html.  Fiat Chrysler recalls 4.8 million vehicles that could get stuck in cruise control. http:\/\/money.cnn.com\/2018\/05\/25\/autos\/fca-recall-cruisecontrol\/ index.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.932539"},{"key":"e_1_3_2_1_14_1","volume-title":"NITRD National Workshop on High-Confidence Automotive Cyber-Physical Systems","author":"Nilsson D.","year":"2008","unstructured":"D. Nilsson and U. Larson . A roadmap for securing vehicles against cyber attacks . In NITRD National Workshop on High-Confidence Automotive Cyber-Physical Systems , 2008 . D. Nilsson and U. Larson. A roadmap for securing vehicles against cyber attacks. In NITRD National Workshop on High-Confidence Automotive Cyber-Physical Systems, 2008."},{"key":"e_1_3_2_1_15_1","volume-title":"AsiaCSN'08","author":"Nilsson D.","year":"2008","unstructured":"D. Nilsson and U. Larson . Simulated attacks on CAN buses: vehicle virus . In AsiaCSN'08 , 2008 . D. Nilsson and U. Larson. Simulated attacks on CAN buses: vehicle virus. In AsiaCSN'08, 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security'10","author":"Rouf Ishtiaq","year":"2010","unstructured":"Ishtiaq Rouf , Rob Miller , Hossen Mustafa , Travis Taylor , Sangho Oh , Wenyuan Xu , Marco Gruteser , Wade Trappe , and Ivan Seskar . Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study . In USENIX Security'10 , 2010 . Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In USENIX Security'10, 2010."},{"key":"e_1_3_2_1_17_1","unstructured":"Tesla responds to Chinese hack with a major security upgrade. https:\/\/www.wired.com\/2016\/09\/ tesla-responds-chinese-hack-major-security-upgrade\/.  Tesla responds to Chinese hack with a major security upgrade. https:\/\/www.wired.com\/2016\/09\/ tesla-responds-chinese-hack-major-security-upgrade\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security'11","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , and Tadayoshi Kohno . Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security'11 , 2011 . Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security'11, 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_23_1","volume-title":"DEFCON'11","author":"Miller Charlie","year":"2011","unstructured":"Charlie Miller and Chris Valasek . Adventures in automotive networks and control units . In DEFCON'11 , 2011 . Charlie Miller and Chris Valasek. Adventures in automotive networks and control units. In DEFCON'11, 2011."},{"key":"e_1_3_2_1_24_1","unstructured":"Charlie Miller and Chris Valasek. CAN Message Injection. http:\/\/illmatics.com\/can%20message%20injection.pdf.  Charlie Miller and Chris Valasek. CAN Message Injection. http:\/\/illmatics.com\/can%20message%20injection.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Hackers remotely kill a Jeep on the Highway - with me in it. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeephighway\/.  Hackers remotely kill a Jeep on the Highway - with me in it. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeephighway\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Black Hat USA'15","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . Remote exploitation of an unaltered passenger vehicle . In Black Hat USA'15 , 2015 . Charlie Miller and Chris Valasek. Remote exploitation of an unaltered passenger vehicle. In Black Hat USA'15, 2015."},{"key":"e_1_3_2_1_27_1","unstructured":"On-Board Diagnostics. http:\/\/www.car-engineer.com\/introduction-toon- board-diagnostic-obd\/.  On-Board Diagnostics. http:\/\/www.car-engineer.com\/introduction-toon- board-diagnostic-obd\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_1_29_1","volume-title":"LC'11","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . CAN Auth -- A Simple , Backward Compatible Broadcast Authentication Protocol for CAN bus. In LC'11 , 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. CANAuth -- A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus. In LC'11, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873558"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security'16","author":"Cho Kyong-Tak","year":"2016","unstructured":"Kyong-Tak Cho and Kang G. Shin . Fingerprinting electronic control units for vehicle intrusion detection . In USENIX Security'16 , 2016 . Kyong-Tak Cho and Kang G. Shin. Fingerprinting electronic control units for vehicle intrusion detection. In USENIX Security'16, 2016."},{"key":"e_1_3_2_1_36_1","volume-title":"ESCAR'17","author":"Wasicek Armin","year":"2017","unstructured":"Armin Wasicek , Mert D. Pese , Andre Weimerskirch , Yelizaveta Burakova , and Karan Singh . Context-aware intrusion detection in automotive control systems . In ESCAR'17 , 2017 . Armin Wasicek, Mert D. Pese, Andre Weimerskirch, Yelizaveta Burakova, and Karan Singh. Context-aware intrusion detection in automotive control systems. In ESCAR'17, 2017."},{"key":"e_1_3_2_1_37_1","volume-title":"Black Hat USA","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . A survey of remote automotive attack surfaces . In Black Hat USA , 2015 . Charlie Miller and Chris Valasek. A survey of remote automotive attack surfaces. In Black Hat USA, 2015."},{"key":"e_1_3_2_1_38_1","volume-title":"Diagnosis in automotive systems: A survey","author":"Lanigan Patrick E.","year":"2011","unstructured":"Patrick E. Lanigan , Soila Kavulya , Priya Narasimhan , Thomas E. Fuhrman , and Mutasim A. Salman . Diagnosis in automotive systems: A survey , 2011 . Patrick E. Lanigan, Soila Kavulya, Priya Narasimhan, Thomas E. Fuhrman, and Mutasim A. Salman. Diagnosis in automotive systems: A survey, 2011."},{"key":"e_1_3_2_1_39_1","volume-title":"Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. ArXiv e-prints","author":"Choi W.","year":"2016","unstructured":"W. Choi , H. J. Jo , S. Woo , J. Y. Chun , J. Park , and D. H. Lee . Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. ArXiv e-prints , 2016 . W. Choi, H. J. Jo, S. Woo, J. Y. Chun, J. Park, and D. H. Lee. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. ArXiv e-prints, 2016."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"e_1_3_2_1_41_1","volume-title":"System and method for vehicle diagnostics","author":"Breed David S.","year":"2006","unstructured":"David S. Breed . System and method for vehicle diagnostics , 2006 . David S. Breed. System and method for vehicle diagnostics, 2006."},{"key":"e_1_3_2_1_42_1","volume-title":"Telematics system for vehicle diagnostics","author":"Breed David S.","year":"2004","unstructured":"David S. Breed . Telematics system for vehicle diagnostics , 2004 . David S. Breed. Telematics system for vehicle diagnostics, 2004."},{"key":"e_1_3_2_1_43_1","first-page":"155","volume-title":"IAS'08","author":"Baker Christopher R.","year":"2008","unstructured":"Christopher R. Baker , David Ferguson , and John M. Dolan . Robust mission execution for autonomous urban driving . In IAS'08 , pages 155 -- 163 , July 2008 . Christopher R. Baker, David Ferguson, and John M. Dolan. Robust mission execution for autonomous urban driving. In IAS'08, pages 155--163, July 2008."},{"key":"e_1_3_2_1_44_1","volume-title":"The seven properties of highly secure devices. Technical report","author":"Hunt Galen","year":"2017","unstructured":"Galen Hunt , George Letey , and Ed Nightingale . The seven properties of highly secure devices. Technical report , 2017 . Galen Hunt, George Letey, and Ed Nightingale. The seven properties of highly secure devices. Technical report, 2017."},{"key":"e_1_3_2_1_45_1","unstructured":"Selected worldwide automotive manufacturers' profit margin between January 2016 and June 2016. https:\/\/www.statista.com\/statistics\/697263\/automotivemanufacturers-profit-margin-worldwide\/.  Selected worldwide automotive manufacturers' profit margin between January 2016 and June 2016. https:\/\/www.statista.com\/statistics\/697263\/automotivemanufacturers-profit-margin-worldwide\/."},{"key":"e_1_3_2_1_46_1","unstructured":"OBD-II PIDs. https:\/\/en.wikipedia.org\/wiki\/OBD-II_PIDs.  OBD-II PIDs. https:\/\/en.wikipedia.org\/wiki\/OBD-II_PIDs."},{"key":"e_1_3_2_1_47_1","unstructured":"6\n    Most Common Crankshaft Position Sensor Symptoms. https:\/\/carfromjapan.com\/article\/car-maintenance\/commoncrankshaft-position-sensor-symptoms\/.  6 Most Common Crankshaft Position Sensor Symptoms. https:\/\/carfromjapan.com\/article\/car-maintenance\/commoncrankshaft-position-sensor-symptoms\/."},{"key":"e_1_3_2_1_48_1","unstructured":"How to Diagnose a Bad or Failing Transmission Speed Sensor? https:\/\/www.yourmechanic.com\/article\/symptoms-of-a-bad-orfailing-transmission-speed-sensor.  How to Diagnose a Bad or Failing Transmission Speed Sensor? https:\/\/www.yourmechanic.com\/article\/symptoms-of-a-bad-orfailing-transmission-speed-sensor."},{"key":"e_1_3_2_1_49_1","unstructured":"Understanding Your Alternator. http:\/\/www.hotrod.com\/articles\/0206sr-understanding-youralternator\/.  Understanding Your Alternator. http:\/\/www.hotrod.com\/articles\/0206sr-understanding-youralternator\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-658-01784-2","volume-title":"Bosch Automotive Electrics and Automotive Electronics","author":"Bosch Robert","year":"2014","unstructured":"Robert Bosch . Bosch Automotive Electrics and Automotive Electronics . Springer , 2014 . Robert Bosch. Bosch Automotive Electrics and Automotive Electronics. Springer, 2014."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2597842"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2005.1461226"},{"key":"e_1_3_2_1_53_1","unstructured":"Dynamic Time Warping. http:\/\/web.science.mq.edu.au\/?cassidy\/comp449\/html\/ch11s02.html.  Dynamic Time Warping. http:\/\/web.science.mq.edu.au\/?cassidy\/comp449\/html\/ch11s02.html."},{"key":"e_1_3_2_1_54_1","volume-title":"Introduction to statistical quality control","author":"Montgomery D.","year":"2000","unstructured":"D. Montgomery . Introduction to statistical quality control . Wiley , 2000 . D. Montgomery. Introduction to statistical quality control. Wiley, 2000."},{"key":"e_1_3_2_1_55_1","volume-title":"RSS'17","author":"Mavromatis Stergios","year":"2017","unstructured":"Stergios Mavromatis and Alexandra Laiou . Safety assessment of control design parameters through vehicle dynamics model . In RSS'17 , 2017 . Stergios Mavromatis and Alexandra Laiou. Safety assessment of control design parameters through vehicle dynamics model. In RSS'17, 2017."}],"event":{"name":"MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Cabos Mexico","acronym":"MobiCom '19"},"container-title":["The 25th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300061.3300126","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300061.3300126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:52Z","timestamp":1750202632000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":53,"alternative-id":["10.1145\/3300061.3300126","10.1145\/3300061"],"URL":"https:\/\/doi.org\/10.1145\/3300061.3300126","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}