{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:52:15Z","timestamp":1762005135100,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339269","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Plug-and-Patch"],"prefix":"10.1145","author":[{"given":"Lucas","family":"Buschlinger","sequence":"first","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]},{"given":"Markus","family":"Springer","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]},{"given":"Maria","family":"Zhdanova","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. DELTA: Datensicherheit und -integrit\u00e4t in der Elektromobilit\u00e4t beim Laden und eichrechtkonformen Abrechnen. https:\/\/www.delta-elektromobilitaet.de\/.  2016. DELTA: Datensicherheit und -integrit\u00e4t in der Elektromobilit\u00e4t beim Laden und eichrechtkonformen Abrechnen. https:\/\/www.delta-elektromobilitaet.de\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2669647"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.911001"},{"volume-title":"A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Computer Science - Research and Development 33, 1 (01","year":"2018","author":"Bao Kaibin","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Daniel Bogdan Razvan Bogdan and M Popa. 2016. Delta Flashing of an ECU in the Automotive Industry.  Daniel Bogdan Razvan Bogdan and M Popa. 2016. Delta Flashing of an ECU in the Automotive Industry.","DOI":"10.1109\/SACI.2016.7507429"},{"key":"e_1_3_2_1_6_1","unstructured":"Mathias Dalheimer. 2017. Chaos Computer Club hacks e-motor charging stations. https:\/\/www.ccc.de\/en\/updates\/2017\/e-motor. Retrieved on 30.03.2019.  Mathias Dalheimer. 2017. Chaos Computer Club hacks e-motor charging stations. https:\/\/www.ccc.de\/en\/updates\/2017\/e-motor. Retrieved on 30.03.2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_8_1","unstructured":"Transport & Environment. 2018. Roll-out of public EV charging infrastructure in the EU. https:\/\/www.transportenvironment.org\/publications\/roll-out-public-ev-charging-infrastructure-eu. Retrieved on 28.03.2019.  Transport & Environment. 2018. Roll-out of public EV charging infrastructure in the EU. https:\/\/www.transportenvironment.org\/publications\/roll-out-public-ev-charging-infrastructure-eu. Retrieved on 28.03.2019."},{"key":"e_1_3_2_1_9_1","unstructured":"Charging Interface Initiative e.V. 2017. CharIN e.V. supports ISO\/IEC 15118. http:\/\/www.charinev.org\/fileadmin\/Downloads\/Papers_and_Regulations\/CharIN_Support_of_ISOIEC_15118.pdf. Retrieved on 30.03.2019.  Charging Interface Initiative e.V. 2017. CharIN e.V. supports ISO\/IEC 15118. http:\/\/www.charinev.org\/fileadmin\/Downloads\/Papers_and_Regulations\/CharIN_Support_of_ISOIEC_15118.pdf. Retrieved on 30.03.2019."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2397439"},{"key":"e_1_3_2_1_11_1","first-page":"777","article-title":"Software update method, apparatus and system","volume":"10","author":"Frazer Mark","year":"2005","journal-title":"US Patent App."},{"volume-title":"Advanced Remote Firmware Upgrades Using TPM 2.0","author":"Fuchs Andreas","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Andy Greenberg. 2015. Hackers Remotely Kill A Jeep On The Highway -- with Me In It. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/. Retrieved on 30.03.2019.  Andy Greenberg. 2015. Hackers Remotely Kill A Jeep On The Highway -- with Me In It. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/. Retrieved on 30.03.2019."},{"key":"e_1_3_2_1_14_1","unstructured":"Trusted Computing Group. 2011. A CMC Profile for AIK Certificate Enrollment. Specification Version 1.0 - Revision 7.  Trusted Computing Group. 2011. A CMC Profile for AIK Certificate Enrollment. Specification Version 1.0 - Revision 7."},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted Computing Group. 2016. Trusted Platform Module Library - Part 1: Architecture. Specification Family 2.0 - Rev. 01.38.  Trusted Computing Group. 2016. Trusted Platform Module Library - Part 1: Architecture. Specification Family 2.0 - Rev. 01.38."},{"key":"e_1_3_2_1_16_1","unstructured":"Dale Hall and Nic Lutsey. 2017. Emerging Best Practices For Electric Vehicle Charging Infrastructure. https:\/\/www.theicct.org\/sites\/default\/files\/publications\/EV-charging-best-practices_ICCT-white-paper_04102017_vF.pdf. Retrieved on 28.03.2019.  Dale Hall and Nic Lutsey. 2017. Emerging Best Practices For Electric Vehicle Charging Infrastructure. https:\/\/www.theicct.org\/sites\/default\/files\/publications\/EV-charging-best-practices_ICCT-white-paper_04102017_vF.pdf. Retrieved on 28.03.2019."},{"key":"e_1_3_2_1_17_1","unstructured":"Kyle Hyatt. 2019. Chinese carmaker NIO stops traffic for over an hour in Beijing. https:\/\/www.cnet.com\/roadshow\/news\/nio-concept-traffic-stopped-beijing-software-update\/. Retrieved on 29.03.2019.  Kyle Hyatt. 2019. Chinese carmaker NIO stops traffic for over an hour in Beijing. https:\/\/www.cnet.com\/roadshow\/news\/nio-concept-traffic-stopped-beijing-software-update\/. Retrieved on 29.03.2019."},{"key":"e_1_3_2_1_18_1","unstructured":"Muhammad Sabir Idrees Hendrik Schweppe Yves Roudier Marko Wolf Dirk Scheuermann and Olaf Henniger. 2011. Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates. In Nets4Cars\/Nets4Trains.  Muhammad Sabir Idrees Hendrik Schweppe Yves Roudier Marko Wolf Dirk Scheuermann and Olaf Henniger. 2011. Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates. In Nets4Cars\/Nets4Trains."},{"key":"e_1_3_2_1_19_1","unstructured":"Infineon. 2019. A safe for sensitive data in the car: Volkswagen relies on TPM from Infineon. https:\/\/www.infineon.com\/cms\/en\/about-infineon\/press\/market-news\/2019\/INFATV201901-030.html. Retrieved on 29.03.2019.  Infineon. 2019. A safe for sensitive data in the car: Volkswagen relies on TPM from Infineon. https:\/\/www.infineon.com\/cms\/en\/about-infineon\/press\/market-news\/2019\/INFATV201901-030.html. Retrieved on 29.03.2019."},{"key":"e_1_3_2_1_20_1","first-page":"2013","article-title":"Road vehicles -- Vehicle to grid communication interface -- Part 1: General information and use-case definition","volume":"15118","author":"IEC.","year":"2013","journal-title":"ISO Standard"},{"key":"e_1_3_2_1_21_1","first-page":"2014","article-title":"Road vehicles -- Vehicle-to-Grid Communication Interface -- Part 2: Network and application protocol requirements","volume":"15118","author":"IEC.","year":"2014","journal-title":"ISO Standard"},{"key":"e_1_3_2_1_22_1","first-page":"2018","article-title":"Road vehicles -- Vehicle-to-Grid Communication Interface -- Part 2: Network and application protocol requirements","volume":"15118","author":"IEC.","year":"2018","journal-title":"ISO\/DIS"},{"volume-title":"SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols. In Advances in Cryptology - CRYPTO","year":"2003","author":"Krawczyk Hugo","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","first-page":"464","article-title":"Over-the-air vehicle systems updating and associate security protocols","volume":"9","author":"Lewis Derek Lane","year":"2016","journal-title":"US Patent"},{"volume-title":"IEEE Proceedings. Intelligent Vehicles Symposium","year":"2005","author":"Mahmud S. M.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.58"},{"volume-title":"ICC Workshops - 2008 IEEE International Conference on Communications Workshops. 380--384","author":"Nilsson D. K.","key":"e_1_3_2_1_27_1"},{"volume-title":"2008 IEEE Intelligent Vehicles Symposium. 476--481","author":"Nilsson D. K.","key":"e_1_3_2_1_28_1"},{"volume-title":"2008 IEEE Globecom Workshops. 1--5.","author":"Nilsson D. K.","key":"e_1_3_2_1_29_1"},{"volume-title":"Open Charge Point Protocol 2.0 - Part 0 - Introduction. Open Standard. Open Charge Alliance","author":"OCA.","key":"e_1_3_2_1_30_1"},{"volume-title":"Open Charge Point Protocol 2.0 - Part 2 - Specification. Open Standard. Open Charge Alliance","author":"OCA.","key":"e_1_3_2_1_31_1"},{"volume-title":"Open Charge Point Protocol 2.0 - Part 4 - JSON over WebSockets implementation guide. Open Standard. Open Charge Alliance","author":"OCA.","key":"e_1_3_2_1_32_1"},{"volume-title":"4th escar USA.","author":"Petri Richard","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"P. Rademakers and P. Klapwijk. 2017. EV Related Protocol Study. https:\/\/www.elaad.nl\/uploads\/downloads\/downloads_download\/EV_related_protocol_study_v1.1.pdf  P. Rademakers and P. Klapwijk. 2017. EV Related Protocol Study. https:\/\/www.elaad.nl\/uploads\/downloads\/downloads_download\/EV_related_protocol_study_v1.1.pdf"},{"key":"e_1_3_2_1_35_1","first-page":"258","article-title":"Embedded software update methods and systems for digital devices","volume":"10","author":"Ren Yuqing","year":"2005","journal-title":"US Patent App."},{"volume-title":"Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 1--5.","author":"Rubio J. E.","key":"e_1_3_2_1_36_1"},{"volume-title":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS). 1--6.","author":"Raghav V. Sesha","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","first-page":"068","article-title":"Method of safe and recoverable firmware update and device using the same","volume":"12","author":"Shih Hsiang-Chueh","year":"2010","journal-title":"US Patent App."},{"key":"e_1_3_2_1_39_1","unstructured":"Stefan Thom. 2017. RazorClamMCU. https:\/\/github.com\/LordOfDorks\/security-1\/tree\/master\/RazorClamMCU. Retrieved on 29.03.2019.  Stefan Thom. 2017. RazorClamMCU. https:\/\/github.com\/LordOfDorks\/security-1\/tree\/master\/RazorClamMCU. Retrieved on 29.03.2019."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339269"}},"subtitle":["Secure Value Added Services for Electric Vehicle Charging"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":39,"alternative-id":["10.1145\/3339252.3339269","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339269","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}