{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:05Z","timestamp":1775470385356,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427278","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"681-693","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication"],"prefix":"10.1145","author":[{"given":"Yang","family":"Xiao","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University, United States of America"}]},{"given":"Shanghao","family":"Shi","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, United States of America"}]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"e_1_3_2_1_2_1","unstructured":"AUTOSAR. 2017. AUTOSAR Release 4.2.2: Specification of Module Secure Onboard Communication. https:\/\/www.autosar.org\/fileadmin\/user_upload\/standards\/classic\/4-3\/AUTOSAR_SWS_SecureOnboardCommunication.pdf  AUTOSAR. 2017. AUTOSAR Release 4.2.2: Specification of Module Secure Onboard Communication. https:\/\/www.autosar.org\/fileadmin\/user_upload\/standards\/classic\/4-3\/AUTOSAR_SWS_SecureOnboardCommunication.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Secure schemes for secret sharing and key distribution","author":"Amos Beimel"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_50"},{"key":"e_1_3_2_1_5_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques. Springer","author":"Blom Rolf","year":"1984"},{"key":"e_1_3_2_1_6_1","volume-title":"Annual international cryptology conference","author":"Blundo Carlo"},{"key":"e_1_3_2_1_7_1","unstructured":"LIN Consortium. 2010. LIN Specification Package Revision 2.2A.  LIN Consortium. 2010. LIN Specification Package Revision 2.2A."},{"key":"e_1_3_2_1_8_1","unstructured":"MOST Cooperation. 2004. MOST Specification Revision 2.3.  MOST Cooperation. 2004. MOST Specification Revision 2.3."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.118"},{"key":"e_1_3_2_1_10_1","volume-title":"Annual International Cryptology Conference. Springer","author":"Fiat Amos","year":"1993"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19951874"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"e_1_3_2_1_14_1","volume-title":"10th Int. Conf. on Embedded Security in Cars (ESCAR","author":"Hartkopp Oliver","year":"2012"},{"key":"e_1_3_2_1_15_1","volume-title":"10th Int. Conf. on Embedded Security in Cars (ESCAR","author":"Hazem Ahmed","year":"2012"},{"key":"e_1_3_2_1_16_1","volume-title":"Low-speed, fault-tolerant, medium-dependent interface. Standard","author":"ISO."},{"key":"e_1_3_2_1_17_1","volume-title":"Data link layer and physical signalling. Standard","author":"ISO."},{"key":"e_1_3_2_1_18_1","volume-title":"High-speed medium access unit. Standard","author":"ISO."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_20_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Kulandaivel Sekar","year":"2019"},{"key":"e_1_3_2_1_21_1","volume-title":"14th Int. Conf. on Embedded Security in Cars (ESCAR","author":"Kurachi Ryo","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90008-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Conference key agreement from secret sharing. In Australasian Conference on Information Security and Privacy. Springer","author":"Li Chih-Hung","year":"1999"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704153"},{"key":"e_1_3_2_1_25_1","volume-title":"Black Hat USA 2015(2015)","author":"Miller Charlie","year":"2015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.369"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363190"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"e_1_3_2_1_31_1","unstructured":"Robert Bosch GmbH. 1991. CAN Specification Version 2.0.  Robert Bosch GmbH. 1991. CAN Specification Version 2.0."},{"key":"e_1_3_2_1_32_1","unstructured":"Robert Bosch GmbH. 2012. CAN with Flexible Data-Rate Version 1.0.  Robert Bosch GmbH. 2012. CAN with Flexible Data-Rate Version 1.0."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_35_1","unstructured":"Arduino Software. 2020. Arduino IDE Documentation. https:\/\/www.arduino.cc\/en\/Guide  Arduino Software. 2020. Arduino IDE Documentation. https:\/\/www.arduino.cc\/en\/Guide"},{"key":"e_1_3_2_1_36_1","unstructured":"Seeed Studio. 2018. CAN BUS Shield. https:\/\/github.com\/Seeed-Studio\/CAN_BUS_Shield  Seeed Studio. 2018. CAN BUS Shield. https:\/\/github.com\/Seeed-Studio\/CAN_BUS_Shield"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2320605"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134623"},{"key":"e_1_3_2_1_39_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography, Vol.\u00a02011","author":"Van\u00a0Herrewege Anthony","year":"2011"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"e_1_3_2_1_41_1","unstructured":"Rhys Weatherley. 2018. Arduino Cryptography Library. https:\/\/rweather.github.io\/arduinolibs\/crypto.html  Rhys Weatherley. 2018. Arduino Cryptography Library. https:\/\/rweather.github.io\/arduinolibs\/crypto.html"},{"key":"e_1_3_2_1_42_1","volume-title":"Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. In The 2020 Network and Distributed System Security Symposium (NDSS\u201920)","author":"Wen Haohuang","year":"2020"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2519464"},{"key":"e_1_3_2_1_44_1","volume-title":"Bussysteme in der Fahrzeugtechnik","author":"Zimmermann Werner"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":44,"alternative-id":["10.1145\/3427228.3427278","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427278","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}