{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:26:51Z","timestamp":1771612011983,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS 1715458"],"award-info":[{"award-number":["CNS 1715458"]}]},{"name":"NSF","award":["ATD 2123761"],"award-info":[{"award-number":["ATD 2123761"]}]},{"name":"NSF","award":["CNS 1822118"],"award-info":[{"award-number":["CNS 1822118"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511523","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"276-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction"],"prefix":"10.1145","author":[{"given":"Hossein","family":"Shirazi","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"William","family":"Pickard","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Haonan","family":"Wang","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2015. Road vehicles - Controller area network (CAN). https:\/\/www.iso.org\/ standard\/63648.html  2015. Road vehicles - Controller area network (CAN). https:\/\/www.iso.org\/ standard\/63648.html"},{"key":"e_1_3_2_2_2_1","unstructured":"2018. Serial Control and Communications Heavy Duty Vehicle Network. https: \/\/doi.org\/10.4271\/J1939_201808    10.4271\/J1939_201808\n2018. Serial Control and Communications Heavy Duty Vehicle Network. https: \/\/doi.org\/10.4271\/J1939_201808"},{"key":"e_1_3_2_2_3_1","volume-title":"Annual Report","year":"2018","unstructured":"2018. Transportation Statistics Annual Report 2018 . USDOT Bureau of Transportation Statistics ( 2018). https:\/\/doi.org\/10.21949\/1502596 10.21949\/1502596 2018. Transportation Statistics Annual Report 2018. USDOT Bureau of Transportation Statistics (2018). https:\/\/doi.org\/10.21949\/1502596"},{"key":"e_1_3_2_2_4_1","volume-title":"High-Performance OCR for Printed English and Fraktur Using LSTM Networks. In 12th International Conference on Document Analysis and Recognition. 683--687","author":"Breuel Thomas M","year":"2013","unstructured":"Thomas M Breuel , Adnan Ul-Hasan , Mayce Ali Al-Azawi , and Faisal Shafait . 2013 . High-Performance OCR for Printed English and Fraktur Using LSTM Networks. In 12th International Conference on Document Analysis and Recognition. 683--687 . Thomas M Breuel, Adnan Ul-Hasan, Mayce Ali Al-Azawi, and Faisal Shafait. 2013. High-Performance OCR for Printed English and Fraktur Using LSTM Networks. In 12th International Conference on Document Analysis and Recognition. 683--687."},{"key":"e_1_3_2_2_5_1","volume-title":"Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. In 10th USENIX Workshop on Offensive Technologies (WOOT 16)","author":"Burakova Yelizaveta","year":"2016","unstructured":"Yelizaveta Burakova , Bill Hass , Leif Millar , and Andr\u00e9 Weimerskirch . 2016 . Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. In 10th USENIX Workshop on Offensive Technologies (WOOT 16) . Yelizaveta Burakova, Bill Hass, Leif Millar, and Andr\u00e9 Weimerskirch. 2016. Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. In 10th USENIX Workshop on Offensive Technologies (WOOT 16)."},{"key":"e_1_3_2_2_6_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium (USENIX Security 11)","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway , Damon McCoy , Brian Kantor , Danny Anderson , Hovav Shacham , Stefan Savage , Karl Koscher , Alexei Czeskis , Franziska Roesner , and Tadayoshi Kohno . 2011 . Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium (USENIX Security 11) . Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In 20th USENIX Security Symposium (USENIX Security 11)."},{"key":"e_1_3_2_2_7_1","first-page":"911","article-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium","volume":"16","author":"Cho Kyong-Tak","year":"2016","unstructured":"Kyong-Tak Cho and Kang G. Shin . 2016 . Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium , USENIX Security 16. 911 -- 927 . Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium, USENIX Security 16. 911--927.","journal-title":"USENIX Security"},{"key":"e_1_3_2_2_8_1","first-page":"7","article-title":"Detecting Attacks on the CAN Protocol With Machine Learning","volume":"558","author":"Chockalingam Valliappa","year":"2016","unstructured":"Valliappa Chockalingam , Ian Larson , Daniel Lin , and Spencer Nofzinger . 2016 . Detecting Attacks on the CAN Protocol With Machine Learning . Annu EECS 558 , 7 . Valliappa Chockalingam, Ian Larson, Daniel Lin, and Spencer Nofzinger. 2016. Detecting Attacks on the CAN Protocol With Machine Learning. Annu EECS 558, 7.","journal-title":"Annu EECS"},{"key":"e_1_3_2_2_9_1","volume-title":"Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee.","author":"Choi Wonsuk","year":"2018","unstructured":"Wonsuk Choi , Hyo Jin Jo , Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2018 . Identifying ECUs using inimitable characteristics of signals in controller area networks. In Transactions on Vehicular Technology . Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2018. Identifying ECUs using inimitable characteristics of signals in controller area networks. In Transactions on Vehicular Technology."},{"key":"e_1_3_2_2_10_1","volume-title":"Moon Chan Park, and Dong Hoon Lee.","author":"Choi Wonsuk","year":"2018","unstructured":"Wonsuk Choi , Kyungho Joo , Hyo Jin Jo , Moon Chan Park, and Dong Hoon Lee. 2018 . Voltageids : Low-level communication characteristics for automotive intrusion detection system. In Transactions on Information Forensics and Security . Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, and Dong Hoon Lee. 2018. Voltageids: Low-level communication characteristics for automotive intrusion detection system. In Transactions on Information Forensics and Security."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.4271\/2016-01-8142"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"e_1_3_2_2_13_1","volume-title":"IEEE Workshop on Automatic Speech Recognition and Understanding. 273--278","author":"Graves A.","unstructured":"A. Graves , N. Jaitly , and A. Mohamed . 2013. Hybrid speech recognition with Deep Bidirectional LSTM . In IEEE Workshop on Automatic Speech Recognition and Understanding. 273--278 . A. Graves, N. Jaitly, and A. Mohamed. 2013. Hybrid speech recognition with Deep Bidirectional LSTM. In IEEE Workshop on Automatic Speech Recognition and Understanding. 273--278."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"e_1_3_2_2_16_1","volume-title":"Gerdes","author":"Kelarestaghi Kaveh Bakhsh","year":"2018","unstructured":"Kaveh Bakhsh Kelarestaghi , Kevin Heaslip , and Ryan M . Gerdes . 2018 . Vehicle Security : Risk Assessment in Transportation . arXiv preprint arXiv abs\/1804.07381 (2018). Kaveh Bakhsh Kelarestaghi, Kevin Heaslip, and Ryan M. Gerdes. 2018. Vehicle Security: Risk Assessment in Transportation. arXiv preprint arXiv abs\/1804.07381 (2018)."},{"key":"e_1_3_2_2_17_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_18_1","volume-title":"Black Hat USA 2015","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015 . Remote exploitation of an unaltered passenger vehicle . Black Hat USA 2015 (2015), 91. http:\/\/illmatics.com\/Remote% 20Car%20Hacking.pdf Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015 (2015), 91. http:\/\/illmatics.com\/Remote% 20Car%20Hacking.pdf"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_2_20_1","volume-title":"Information Systems Security.","author":"Mukherjee Subhojeet","unstructured":"Subhojeet Mukherjee , Hossein Shirazi , Indrakshi Ray , Jeremy Daily , and Rose Gamble . 2016. Practical DoS Attacks on Embedded Networks in Commercial Vehicles . In Information Systems Security. Vol. 10063 . Cham , 23--42. Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, and Rose Gamble. 2016. Practical DoS Attacks on Embedded Networks in Commercial Vehicles. In Information Systems Security. Vol. 10063. Cham, 23--42."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Pal-Stefan Murvay and Bogdan Groza. 2014. Source identification using signal characteristics in controller area networks. In Signal Processing Letters.  Pal-Stefan Murvay and Bogdan Groza. 2014. Source identification using signal characteristics in controller area networks. In Signal Processing Letters.","DOI":"10.1109\/LSP.2014.2304139"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2795384"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"e_1_3_2_2_25_1","volume-title":"Foundations and Practice of Security","author":"Shirazi Hossein","unstructured":"Hossein Shirazi , Indrakshi Ray , and Charles Anderson . 2020. Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles . In Foundations and Practice of Security , Vol. 12056 . Springer International Publishing , 39--55. Hossein Shirazi, Indrakshi Ray, and Charles Anderson. 2020. Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. In Foundations and Practice of Security, Vol. 12056. Springer International Publishing, 39--55."},{"key":"e_1_3_2_2_26_1","volume-title":"Low cost multicast network authentication for embedded control systems. Ph. D. Dissertation","author":"Szilagyi Christopher Johnathan","unstructured":"Christopher Johnathan Szilagyi . 2012. Low cost multicast network authentication for embedded control systems. Ph. D. Dissertation . Carnegie Mellon University . Christopher Johnathan Szilagyi. 2012. Low cost multicast network authentication for embedded control systems. Ph. D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"e_1_3_2_2_28_1","volume-title":"Workshop on Lightweight Cryptography.","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege , Dave Singelee , and Ingrid Verbauwhede . 2011 . CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus . In Workshop on Lightweight Cryptography. Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In Workshop on Lightweight Cryptography."},{"key":"e_1_3_2_2_29_1","volume-title":"Hacking trucks-cybersecurity risks and effective cybersecurity protection for heavy duty vehicles. Automotive-Safety & Security 2017-Sicherheit und Zuverl\u00e4ssigkeit f\u00fcr automobile Informationstechnik","author":"Wolf Marko","year":"2017","unstructured":"Marko Wolf and Robert Lambert . 2017. Hacking trucks-cybersecurity risks and effective cybersecurity protection for heavy duty vehicles. Automotive-Safety & Security 2017-Sicherheit und Zuverl\u00e4ssigkeit f\u00fcr automobile Informationstechnik ( 2017 ). Marko Wolf and Robert Lambert. 2017. Hacking trucks-cybersecurity risks and effective cybersecurity protection for heavy duty vehicles. Automotive-Safety & Security 2017-Sicherheit und Zuverl\u00e4ssigkeit f\u00fcr automobile Informationstechnik (2017)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952917"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.08.069"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511523","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":31,"alternative-id":["10.1145\/3508398.3511523","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511523","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}