{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:44:49Z","timestamp":1759092289152,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001858","name":"Vinnova","doi-asserted-by":"publisher","award":["2018-05013"],"award-info":[{"award-number":["2018-05013"]}],"id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007294","name":"Myndigheten f\u00f6r Samh\u00e4llsskydd och Beredskap","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007294","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3442032","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:16Z","timestamp":1619154556000},"page":"1588-1597","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Spectra"],"prefix":"10.1145","author":[{"given":"Wissam","family":"Aoudi","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Nasser","family":"Nowdehi","sequence":"additional","affiliation":[{"name":"Volvo Cars Corporation, Gothenburg, Sweden"}]},{"given":"Magnus","family":"Almgren","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295453.3295456"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100377"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372318.3372320"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_5_1","volume-title":"Extracting Qualitative Dynamics from Experimental Data. Physica D: Nonlinear Phenomena","author":"Broomhead David S","year":"1986","unstructured":"David S Broomhead and Gregory P King. 1986. Extracting Qualitative Dynamics from Experimental Data. Physica D: Nonlinear Phenomena (1986)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028073"},{"volume-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Cho Kyong-Tak","key":"e_1_3_2_1_7_1","unstructured":"Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 911--927."},{"volume-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Cho Kyong-Tak","key":"e_1_3_2_1_8_1","unstructured":"Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 911--927. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/cho"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810232"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2011.13"},{"volume-title":"Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice","author":"Natale Marco Di","key":"e_1_3_2_1_12_1","unstructured":"Marco Di Natale, Haibo Zeng, Paolo Giusto, and Arkadeb Ghosal. 2012. Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice. Springer Science & Business Media."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4271\/2013-01-1264"},{"key":"e_1_3_2_1_14_1","volume-title":"Vladimir Viktorovich Nekrutkin, and Anatoly Alexandrovich Zhigljavsky","author":"Golyandina Nina","year":"2001","unstructured":"Nina Golyandina, Vladimir Viktorovich Nekrutkin, and Anatoly Alexandrovich Zhigljavsky. 2001. Analysis of Time Series Structure: SSA and Related Techniques. Chapman & Hall\/CRC."},{"volume-title":"Singular Spectrum Analysis for Time Series","author":"Golyandina Nina","key":"e_1_3_2_1_15_1","unstructured":"Nina Golyandina and Anatoly Zhigljavsky. 2013. Singular Spectrum Analysis for Time Series. Springer Science & Business Media."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"e_1_3_2_1_17_1","volume-title":"Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids. In 2019 15th European Dependable Computing Conference (EDCC). IEEE, 171--176","author":"Kemal Mohammed S","year":"2019","unstructured":"Mohammed S Kemal, Wissam Aoudi, Rasus L Olsen, Magnus Almgren, and Hans-Peter Schwefel. 2019. Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids. In 2019 15th European Dependable Computing Conference (EDCC). IEEE, 171--176."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_22_1","unstructured":"Fred Lambert. 2017. Keen Lab Hackers Managed to Take Control of Tesla Vehicles Again. https:\/\/electrek.co\/2017\/07\/28\/tesla-hack-keen-lab\/ Accessed: 2018-11-15."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"e_1_3_2_1_25_1","first-page":"260","article-title":"Adventures in Automotive Networks and Control Units","volume":"21","author":"Miller Charlie","year":"2013","unstructured":"Charlie Miller and Chris Valasek. 2013. Adventures in Automotive Networks and Control Units. Def Con 21 (2013), 260--264.","journal-title":"Def Con"},{"key":"e_1_3_2_1_26_1","volume-title":"Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA (2015)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064816"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4271\/2012-01-1000"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"e_1_3_2_1_32_1","unstructured":"Sen Nie Ling Liu and Yuefeng Du. 2017. Free-Fall: Hacking Tesla from Wireless to Can Bus. https:\/\/www.blackhat.com\/docs\/us-17\/thursday\/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"e_1_3_2_1_34_1","volume-title":"Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks. In Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE\/IFIP Conference on. IEEE, 1--12","author":"Studnia Ivan","year":"2013","unstructured":"Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Ka\u00e2niche, and Youssef Laarouchi. 2013. Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks. In Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE\/IFIP Conference on. IEEE, 1--12."},{"key":"e_1_3_2_1_35_1","volume-title":"Singular Spectrum Analysis in Nonlinear Dynamics, with Applications to Paleoclimatic Time Series. Physica D: Nonlinear Phenomena","author":"Vautard Robert","year":"1989","unstructured":"Robert Vautard and Michael Ghil. 1989. Singular Spectrum Analysis in Nonlinear Dynamics, with Applications to Paleoclimatic Time Series. Physica D: Nonlinear Phenomena (1989)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018403"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2013.2243633"}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event Republic of Korea","acronym":"SAC '21"},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3442032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:25Z","timestamp":1750195465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442032"}},"subtitle":["detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloads"],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":36,"alternative-id":["10.1145\/3412841.3442032","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3442032","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}