{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:28:53Z","timestamp":1775179733930,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO","award":["W911NF-19-1-0050"],"award-info":[{"award-number":["W911NF-19-1-0050"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1410000, CNS-1801402, CPS-1658225"],"award-info":[{"award-number":["CNS-1410000, CNS-1801402, CPS-1658225"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359834","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"229-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["SIMPLE"],"prefix":"10.1145","author":[{"given":"Mahsa","family":"Foruhandeh","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Yanmao","family":"Man","sequence":"additional","affiliation":[{"name":"University of Arizona"}]},{"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arizona"}]},{"given":"Thidapat","family":"Chantem","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267643"},{"key":"e_1_3_2_1_2_1","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop . 2006. Pattern Recognition and Machine Learning . Springer . http:\/\/research.microsoft.com\/en-us\/um\/people\/cmbishop\/prml\/ Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning. Springer. http:\/\/research.microsoft.com\/en-us\/um\/people\/cmbishop\/prml\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4036-3","volume-title":"d.]. Guide to biometrics","author":"Bolle Ruud M","year":"2004","unstructured":"Ruud M Bolle , Jonathan H Connell , Sharath Pankanti , Nalini K Ratha , and Andrew W Senior . [n. d.]. Guide to biometrics . 2004 . H. Hakobyan et al.\/Human Identification Using Virtual 3D Imaging to Control Border Crossing 230 ([n. d.]). Ruud M Bolle, Jonathan H Connell, Sharath Pankanti, Nalini K Ratha, and Andrew W Senior. [n. d.]. Guide to biometrics. 2004. H. Hakobyan et al.\/Human Identification Using Virtual 3D Imaging to Control Border Crossing 230 ([n. d.])."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , Tadayoshi Kohno , 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces .. In USENIX Security Symposium . San Francisco. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In USENIX Security Symposium. San Francisco."},{"key":"e_1_3_2_1_6_1","volume-title":"Cyber Sensing","author":"Chilenski Mark","year":"2018","unstructured":"Mark Chilenski , George Cybenko , Isaac Dekine , Piyush Kumar , and Gil Raz . 2018. Control flow graph modifications for improved RF-based processor tracking performance . In Cyber Sensing 2018 , Vol. 10630 . International Society for Optics and Photonics , 106300I. Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, and Gil Raz. 2018. Control flow graph modifications for improved RF-based processor tracking performance. In Cyber Sensing 2018, Vol. 10630. International Society for Optics and Photonics, 106300I."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium. 911--927","author":"Cho Kyong-Tak","year":"2016","unstructured":"Kyong-Tak Cho and Kang G Shin . 2016 . Fingerprinting Electronic Control Units for Vehicle Intrusion Detection .. In USENIX Security Symposium. 911--927 . Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.. In USENIX Security Symposium. 911--927."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"e_1_3_2_1_10_1","volume-title":"Moon Chan Park, and Dong Hoon Lee.","author":"Choi Wonsuk","year":"2018","unstructured":"Wonsuk Choi , Kyungho Joo , Hyo Jin Jo , Moon Chan Park, and Dong Hoon Lee. 2018 . VoltageIDS: Low- Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Transactions on Information Forensics and Security ( 2018). Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, and Dong Hoon Lee. 2018. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_11_1","unstructured":"Renesas Electronics Corporation. 2004. HA13721 High speed CAN transceiver datasheet.  Renesas Electronics Corporation. 2004. HA13721 High speed CAN transceiver datasheet."},{"key":"e_1_3_2_1_12_1","volume-title":"Open-Source Testbed to Enable Full-Sized Automated Vehicle Research. arXiv preprint arXiv:1708.07771","author":"Costley Austin","year":"2017","unstructured":"Austin Costley , Chase Kunz , Ryan Gerdes , and Rajnikant Sharma . 2017. Low Cost , Open-Source Testbed to Enable Full-Sized Automated Vehicle Research. arXiv preprint arXiv:1708.07771 ( 2017 ). Austin Costley, Chase Kunz, Ryan Gerdes, and Rajnikant Sharma. 2017. Low Cost, Open-Source Testbed to Enable Full-Sized Automated Vehicle Research. arXiv preprint arXiv:1708.07771 (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-007-9012-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_27"},{"key":"e_1_3_2_1_17_1","volume-title":"Physical-Layer Detection of Hardware Keyloggers. In International Workshop on Recent Advances in Intrusion Detection. Springer, 26--47","author":"Gerdes Ryan M","year":"2015","unstructured":"Ryan M Gerdes and Saptarshi Mallick . 2015 . Physical-Layer Detection of Hardware Keyloggers. In International Workshop on Recent Advances in Intrusion Detection. Springer, 26--47 . Ryan M Gerdes and Saptarshi Mallick. 2015. Physical-Layer Detection of Hardware Keyloggers. In International Workshop on Recent Advances in Intrusion Detection. Springer, 26--47."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2197746"},{"key":"e_1_3_2_1_19_1","volume-title":"Hackers Remotely Kill a Jeep on the Highway---With Me in It. Wired (Dec","author":"Greenberg Andy","year":"2015","unstructured":"Andy Greenberg . 2015. Hackers Remotely Kill a Jeep on the Highway---With Me in It. Wired (Dec 2015 ). Andy Greenberg. 2015. Hackers Remotely Kill a Jeep on the Highway---With Me in It. Wired (Dec 2015)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2736344"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_22_1","unstructured":"Grid Connect Inc. 2017. PCAN-USB FD CAN USB Flexible Data Rate Adapter. https:\/\/gridconnect.box.com\/shared\/static\/oggfdg2b1w46rpz821v57rsnpto4jw4g.pdf  Grid Connect Inc. 2017. PCAN-USB FD CAN USB Flexible Data Rate Adapter. https:\/\/gridconnect.box.com\/shared\/static\/oggfdg2b1w46rpz821v57rsnpto4jw4g.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Texas Instruments Incorporated. 2014. TLV1117 Adjustable and Fixed Low-Dropout Voltage Regulator.  Texas Instruments Incorporated. 2014. TLV1117 Adjustable and Fixed Low-Dropout Voltage Regulator."},{"key":"e_1_3_2_1_24_1","unstructured":"Texas Instruments Incorporated. 2015-2016. TCAN33\u00d7 3.3-V CAN Transceivers with CAN FD (Flexible Data Rate).  Texas Instruments Incorporated. 2015-2016. TCAN33\u00d7 3.3-V CAN Transceivers with CAN FD (Flexible Data Rate)."},{"key":"e_1_3_2_1_25_1","unstructured":"Semiconductor Components Industries. 2014. NCV7340 High speed CAN transceiver datasheet.  Semiconductor Components Industries. 2014. NCV7340 High speed CAN transceiver datasheet."},{"key":"e_1_3_2_1_26_1","unstructured":"Texas Instruments. 2013. Tiva\u2122 C Series TM4C123G LaunchPad Evaluation Board User's Guide.  Texas Instruments. 2013. Tiva\u2122 C Series TM4C123G LaunchPad Evaluation Board User's Guide."},{"key":"e_1_3_2_1_27_1","unstructured":"Maxim Integrated. 2014. MAX3051 CAN transceiver datasheet.  Maxim Integrated. 2014. MAX3051 CAN transceiver datasheet."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"e_1_3_2_1_32_1","volume-title":"Multi-function data acquisition","author":"Measurement Computing Corporation 2016.","unstructured":"Measurement Computing Corporation 2016. Multi-function data acquisition . Measurement Computing Corporation . Measurement Computing Corporation 2016. Multi-function data acquisition. Measurement Computing Corporation."},{"key":"e_1_3_2_1_33_1","volume-title":"Black Hat USA 2015","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015 . Remote exploitation of an unaltered passenger vehicle . Black Hat USA 2015 (2015). Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015 (2015)."},{"key":"e_1_3_2_1_34_1","unstructured":"Charlie Miller and Chris Valasek. 2016. CAN Message Injection - OG Dynamite Edition. http:\/\/illmatics.com\/can%20message%20injection.pdf  Charlie Miller and Chris Valasek. 2016. CAN Message Injection - OG Dynamite Edition. http:\/\/illmatics.com\/can%20message%20injection.pdf"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_1_40_1","volume-title":"Cloaking the Clock: Emulating Clock Skew in Controller Area Networks. arXiv preprint arXiv:1710.02692","author":"Sagong Sang Uk","year":"2017","unstructured":"Sang Uk Sagong , Xuhang Ying , Andrew Clark , Linda Bushnell , and Radha Poovendran . 2017. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks. arXiv preprint arXiv:1710.02692 ( 2017 ). Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, and Radha Poovendran. 2017. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks. arXiv preprint arXiv:1710.02692 (2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"Philips Semiconductors. 1999. TJA1050 High speed CAN transceiver datasheet.  Philips Semiconductors. 1999. TJA1050 High speed CAN transceiver datasheet."},{"key":"e_1_3_2_1_42_1","unstructured":"Colin Soutar et al. 2002. Biometric system security. White Paper Bioscrypt http:\/\/www.bioscrypt.com (2002).  Colin Soutar et al. 2002. Biometric system security. White Paper Bioscrypt http:\/\/www.bioscrypt.com (2002)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"e_1_3_2_1_45_1","unstructured":"Linear Technologies. 2018. LTC1743---12-Bit 50Msps ADC. https:\/\/www.analog.com\/en\/products\/ltc1743.html#product-documentation  Linear Technologies. 2018. LTC1743---12-Bit 50Msps ADC. https:\/\/www.analog.com\/en\/products\/ltc1743.html#product-documentation"},{"key":"e_1_3_2_1_46_1","unstructured":"Texas Instruments Incorporated 2014. Microcontroller data sheet. Texas Instruments Incorporated.  Texas Instruments Incorporated 2014. Microcontroller data sheet. Texas Instruments Incorporated."},{"key":"e_1_3_2_1_47_1","unstructured":"Texas Instruments Incorporated 2016. CAN transceiver. Texas Instruments Incorporated.  Texas Instruments Incorporated 2016. CAN transceiver. Texas Instruments Incorporated."},{"key":"e_1_3_2_1_48_1","unstructured":"Brian Thorne. 2019. python-can controller area network support for Python developers. https:\/\/python-can.readthedocs.io  Brian Thorne. 2019. python-can controller area network support for Python developers. https:\/\/python-can.readthedocs.io"},{"key":"e_1_3_2_1_49_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus . In ECRYPT Workshop on Lightweight Cryptography , Vol. 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography, Vol. 2011."},{"key":"e_1_3_2_1_50_1","volume-title":"Digital fingerprinting","author":"Wang Cliff","unstructured":"Cliff Wang , Ryan M Gerdes , Yong Guan , and Sneha Kumar Kasera . 2016. Digital fingerprinting . Springer . Cliff Wang, Ryan M Gerdes, Yong Guan, and Sneha Kumar Kasera. 2016. Digital fingerprinting. Springer."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/503561.503582"},{"key":"e_1_3_2_1_52_1","volume-title":"Workshop on Embedded Security in Cars.","author":"Wolf Marko","year":"2004","unstructured":"Marko Wolf , Andr\u00e9 Weimerskirch , and Christof Paar . 2004 . Security in automotive bus systems . In Workshop on Embedded Security in Cars. Marko Wolf, Andr\u00e9 Weimerskirch, and Christof Paar. 2004. Security in automotive bus systems. In Workshop on Embedded Security in Cars."},{"key":"e_1_3_2_1_53_1","volume-title":"TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks. arXiv preprint arXiv:1903.05231","author":"Ying Xuhang","year":"2019","unstructured":"Xuhang Ying , Giuseppe Bernieri , Mauro Conti , and Radha Poovendran . 2019 . TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks. arXiv preprint arXiv:1903.05231 (2019). Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. 2019. TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks. arXiv preprint arXiv:1903.05231 (2019)."},{"key":"e_1_3_2_1_54_1","volume-title":"Face Recognition","author":"Zhao Wenyi","unstructured":"Wenyi Zhao , Arvindh Krishnaswamy , Rama Chellappa , Daniel L Swets , and John Weng . 1998. Discriminant analysis of principal components for face recognition . In Face Recognition . Springer , 73--85. Wenyi Zhao, Arvindh Krishnaswamy, Rama Chellappa, Daniel L Swets, and John Weng. 1998. Discriminant analysis of principal components for face recognition. In Face Recognition. Springer, 73--85."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090826"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359834","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359834"}},"subtitle":["single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":53,"alternative-id":["10.1145\/3359789.3359834","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359834","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}