{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T06:03:52Z","timestamp":1759730632969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T00:00:00Z","timestamp":1570492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,8]]},"DOI":"10.1145\/3359999.3360492","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["On Threat Analysis and Risk Estimation of Automotive Ransomware"],"prefix":"10.1145","author":[{"given":"Nils","family":"Weiss","sequence":"first","affiliation":[{"name":"University of Applied Sciences Regensburg, Germany"}]},{"given":"Markus","family":"Schr\u00f6tter","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Regensburg"}]},{"given":"Rudolf","family":"Hackenberg","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Regensburg"}]}],"member":"320","published-online":{"date-parts":[[2019,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cornelius Bittersohl and Timothy\u00a0G. Thoppil. [n. d.]. Automotive Cybersecurity. Developing a thriving security ecosystem within automotive. https:\/\/www.p3-group.com\/en\/wp-content\/uploads\/2017\/09\/P3NA_AutoCyberSec.pdf  Cornelius Bittersohl and Timothy\u00a0G. Thoppil. [n. d.]. Automotive Cybersecurity. Developing a thriving security ecosystem within automotive. https:\/\/www.p3-group.com\/en\/wp-content\/uploads\/2017\/09\/P3NA_AutoCyberSec.pdf"},{"volume-title":"Retrieved","year":"2017","author":"May CERT-MU.","key":"e_1_3_2_1_2_1"},{"volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium","year":"2011","author":"Checkoway Stephen","key":"e_1_3_2_1_3_1"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_4_1"},{"volume-title":"Retrieved","year":"2017","author":"ENDGAME.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Rudolf Hackenberg Nils Weiss Sebastian Renner and Enrico Pozzobon (Eds.). 2017. Extending Vehicle Attack Surface Through Smart Devices. IARIA.  Rudolf Hackenberg Nils Weiss Sebastian Renner and Enrico Pozzobon (Eds.). 2017. Extending Vehicle Attack Surface Through Smart Devices. IARIA."},{"volume-title":"Retrieved","year":"2015","author":"International Organization of Motor Vehicle Manufacturers","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"2005","volume":"201","author":"International Organization of","journal-title":"Motor Vehicle Manufacturers"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_10_1","unstructured":"LogRhythm Labs. 2017. A Technical Analysis of WannaCry Ransomware. Retrieved January 7 2019 from https:\/\/logrhythm.com\/blog\/a-technical-analysis-of-wannacry-ransomware\/  LogRhythm Labs. 2017. A Technical Analysis of WannaCry Ransomware. Retrieved January 7 2019 from https:\/\/logrhythm.com\/blog\/a-technical-analysis-of-wannacry-ransomware\/"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_11_1"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_12_1"},{"volume-title":"CAN Message Injection. Retrieved","year":"2019","key":"e_1_3_2_1_13_1"},{"volume-title":"Retrieved","year":"2015","author":"Szijj Andr\u00e1s","key":"e_1_3_2_1_15_1"},{"volume-title":"Retrieved","year":"2017","author":"Thorne Brian","key":"e_1_3_2_1_16_1"},{"volume-title":"PWIN Guest Lecture. Retrieved","year":"2018","author":"Tschersich Markus","key":"e_1_3_2_1_17_1"},{"volume-title":"Feasible Attack Paths and Effective Protection Against Ransomware in Modern Vehicles. Retrieved","year":"2018","author":"Wolf Marko","key":"e_1_3_2_1_18_1"}],"event":{"name":"CSCS '19: COMPUTER SCIENCE IN CARS SYMPOSIUM","acronym":"CSCS '19","location":"Kaiserslautern Germany"},"container-title":["ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359999.3360492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359999.3360492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,8]]},"references-count":17,"alternative-id":["10.1145\/3359999.3360492","10.1145\/3359999"],"URL":"https:\/\/doi.org\/10.1145\/3359999.3360492","relation":{},"subject":[],"published":{"date-parts":[[2019,10,8]]}}}