{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T15:45:38Z","timestamp":1765295138372,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Commonwealth Cyber Initiative"},{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1650540,1618979"],"award-info":[{"award-number":["1650540,1618979"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,9]]},"DOI":"10.1145\/3394810.3394822","type":"proceedings-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T16:04:53Z","timestamp":1591977893000},"page":"128-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TEECheck"],"prefix":"10.1145","author":[{"given":"Tanmaya","family":"Mishra","sequence":"first","affiliation":[{"name":"Virginia Tech, Arlington, Virginia"}]},{"given":"Thidapat","family":"Chantem","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, Virginia"}]},{"given":"Ryan","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, Virginia"}]}],"member":"320","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. NuMicro M2351 series - a TrustZone empowered micro-controller series focusing on iot security.  2019. NuMicro M2351 series - a TrustZone empowered micro-controller series focusing on iot security."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Renesas provides chips for Toyota. https:\/\/can-newsletter.org\/engineering\/applications\/171114_17-4_renesas-provides-chip-for-toytas-self-driving-cars_renesas.  2019. Renesas provides chips for Toyota. https:\/\/can-newsletter.org\/engineering\/applications\/171114_17-4_renesas-provides-chip-for-toytas-self-driving-cars_renesas."},{"key":"e_1_3_2_1_4_1","volume-title":"Security technology building a secure system using TrustZone technology (white paper). ARM Limited","author":"ARM.","year":"2009","unstructured":"ARM. 2009. Security technology building a secure system using TrustZone technology (white paper). ARM Limited ( 2009 ). ARM. 2009. Security technology building a secure system using TrustZone technology (white paper). ARM Limited (2009)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007795"},{"key":"e_1_3_2_1_7_1","volume-title":"CAN-FD-Sec: Improving Security of CAN-FD Protocol. In Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018","author":"Chang Donghoon","year":"2018","unstructured":"Donghoon Chang . 2018 . CAN-FD-Sec: Improving Security of CAN-FD Protocol. In Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018 , Barcelona, Spain , September 6-7, 2018, Revised Selected Papers. Springer, 77. Donghoon Chang. 2018. CAN-FD-Sec: Improving Security of CAN-FD Protocol. In Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Springer, 77."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","volume":"4","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , Tadayoshi Kohno , 2011 . Comprehensive experimental analyses of automotive attack surfaces .. In USENIX Security Symposium , Vol. 4 . San Francisco, 447--462. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive experimental analyses of automotive attack surfaces.. In USENIX Security Symposium, Vol. 4. San Francisco, 447--462."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security Symposium. 911--927","author":"Cho Kyong-Tak","year":"2016","unstructured":"Kyong-Tak Cho and Kang G Shin . 2016 . Fingerprinting electronic control units for vehicle intrusion detection . In USENIX Security Symposium. 911--927 . Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In USENIX Security Symposium. 911--927."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19990304"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"e_1_3_2_1_14_1","volume-title":"14th International VDI Congress Electronic Systems for Vehicles","volume":"62","author":"F\u00fcrst Simon","year":"2009","unstructured":"Simon F\u00fcrst , J\u00fcrgen M\u00f6ssinger , Stefan Bunzel , Thomas Weber , Frank Kirschke-Biller , Peter Heitk\u00e4mper , Gerulf Kinkelin , Kenji Nishikawa , and Klaus Lange . 2009 . AUTOSAR-A Worldwide Standard is on the Road . In 14th International VDI Congress Electronic Systems for Vehicles , Baden-Baden , Vol. 62 . 5. Simon F\u00fcrst, J\u00fcrgen M\u00f6ssinger, Stefan Bunzel, Thomas Weber, Frank Kirschke-Biller, Peter Heitk\u00e4mper, Gerulf Kinkelin, Kenji Nishikawa, and Klaus Lange. 2009. AUTOSAR-A Worldwide Standard is on the Road. In 14th International VDI Congress Electronic Systems for Vehicles, Baden-Baden, Vol. 62. 5."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"e_1_3_2_1_16_1","volume-title":"Ali Shuja Siddiqui, and Fareena Saqib","author":"Gui Yutian","year":"2018","unstructured":"Yutian Gui , Ali Shuja Siddiqui, and Fareena Saqib . 2018 . Hardware Based Root of Trust for Electronic Control Units. In SoutheastCon 2018. IEEE , 1--7. Yutian Gui, Ali Shuja Siddiqui, and Fareena Saqib. 2018. Hardware Based Root of Trust for Electronic Control Units. In SoutheastCon 2018. IEEE, 1--7."},{"volume-title":"Proc. iCC. Citeseer, 1--9.","author":"Florian","key":"e_1_3_2_1_17_1","unstructured":"Florian Hartwich et al. 2012. CAN with flexible data-rate . In Proc. iCC. Citeseer, 1--9. Florian Hartwich et al. 2012. CAN with flexible data-rate. In Proc. iCC. Citeseer, 1--9."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_19_1","volume-title":"6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS).","author":"Kramer Simon","year":"2015","unstructured":"Simon Kramer , Dirk Ziegenbein , and Arne Hamann . 2015 . Real world automotive benchmarks for free . In 6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS). Simon Kramer, Dirk Ziegenbein, and Arne Hamann. 2015. Real world automotive benchmarks for free. In 6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2104"},{"key":"e_1_3_2_1_21_1","unstructured":"Arm Ltd. 2019. Keil RTX5.  Arm Ltd. 2019. Keil RTX5."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"volume-title":"RTNS '19","author":"Mukherjee Anway","key":"e_1_3_2_1_23_1","unstructured":"Anway Mukherjee , Tanmaya Mishra , Thidapat Chantem , Nathan Fisher , and Ryan M. Gerdes . 2019. Optimized trusted execution for hard real-time applications on COTS processors . In RTNS '19 . Anway Mukherjee, Tanmaya Mishra, Thidapat Chantem, Nathan Fisher, and Ryan M.Gerdes. 2019. Optimized trusted execution for hard real-time applications on COTS processors. In RTNS '19."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium. 479--498","author":"Noorman Job","year":"2013","unstructured":"Job Noorman , Pieter Agten , Wilfried Daniels , Raoul Strackx , Anthony Van Herrewege , Christophe Huygens , Bart Preneel , Ingrid Verbauwhede , and Frank Piessens . 2013 . Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base . In USENIX Security Symposium. 479--498 . Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Security Symposium. 479--498."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098852"},{"volume-title":"ACM conference on Computer and Communications Security. 552--561","author":"Hovav","key":"e_1_3_2_1_29_1","unstructured":"Hovav Shacham et al. 2007. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) .. In ACM conference on Computer and Communications Security. 552--561 . Hovav Shacham et al. 2007. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).. In ACM conference on Computer and Communications Security. 552--561."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134623"},{"key":"e_1_3_2_1_32_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography","volume":"2011","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus . In ECRYPT Workshop on Lightweight Cryptography , Vol. 2011 . Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography, Vol. 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2018.8624006"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3313783"},{"key":"e_1_3_2_1_36_1","volume-title":"ARMv8-M architecture technical overview. ARM WHITE PAPER","author":"Yiu Joseph","year":"2015","unstructured":"Joseph Yiu . 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER ( 2015 ). Joseph Yiu. 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER (2015)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1874620.1874885"}],"event":{"name":"RTNS 2020: 28th International Conference on Real-Time Networks and Systems","sponsor":["INRIA INRIA Saclay \u00cele-de-France"],"location":"Paris France","acronym":"RTNS 2020"},"container-title":["Proceedings of the 28th International Conference on Real-Time Networks and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394810.3394822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394810.3394822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:01Z","timestamp":1750195921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394810.3394822"}},"subtitle":["Securing Intra-Vehicular Communication Using Trusted Execution"],"short-title":[],"issued":{"date-parts":[[2020,6,9]]},"references-count":35,"alternative-id":["10.1145\/3394810.3394822","10.1145\/3394810"],"URL":"https:\/\/doi.org\/10.1145\/3394810.3394822","relation":{},"subject":[],"published":{"date-parts":[[2020,6,9]]},"assertion":[{"value":"2020-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}