{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:08Z","timestamp":1750308908266,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,8]]},"DOI":"10.1145\/3568160.3570228","type":"proceedings-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T11:17:23Z","timestamp":1669807043000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Steering Your Car With Electromagnetic Fields"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8041-0947","authenticated-orcid":false,"given":"Oliver","family":"P\u00f6llny","sequence":"first","affiliation":[{"name":"Mercedes-Benz AG, DE and Universit\u00e4t Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5182-9463","authenticated-orcid":false,"given":"Albert","family":"Held","sequence":"additional","affiliation":[{"name":"Was with Mercedes-Benz AG, now retired, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Leyland Cecco. 2020. Tesla driver found asleep at wheel of self-driving car doing 150km\/h. https:\/\/www.theguardian.com\/world\/2020\/sep\/17\/canada-tesla-driver-alberta-highway-speeding\/"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security Symposium, Vol.\u00a04","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, 2011. Comprehensive experimental analyses of automotive attack surfaces.. In USENIX Security Symposium, Vol.\u00a04. San Francisco, 447\u2013462."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137051"},{"key":"e_1_3_2_1_4_1","unstructured":"Infineon Technologies AG. 2013. (2.0 ed.). 81726 Munich Germany. https:\/\/www.infineon.com\/dgdl\/Board_Users_Manual_XMC1100_CPU_Card_R2.pdf?fileId=db3a30433da119ff013da232476b1416"},{"key":"e_1_3_2_1_5_1","unstructured":"Infineon Technologies AG. 2016. (1.8 ed.). 81726 Munich Germany. https:\/\/www.infineon.com\/dgdl\/Infineon-xmc1100_AB-DS-v01_08-EN.pdf?fileId=5546d4624a0bf290014a4bdaff9325bd"},{"key":"e_1_3_2_1_6_1","unstructured":"Infineon Technologies AG. 2018. TLE5501 (1.0 ed.). 81726 Munich Germany. https:\/\/www.infineon.com\/cms\/de\/product\/sensor\/magnetic-sensors\/magnetic-position-sensors\/angle-sensors\/tle5501-e0001\/#!?fileId=5546d46264a8de7e0164eca986da1a32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_9_1","unstructured":"Theo Leggett. 2019. Road safety: UK set to adopt vehicle speed limiters. https:\/\/www.bbc.com\/news\/business-47715415"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700319"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498337"},{"key":"e_1_3_2_1_12_1","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller Charlie","year":"2013","unstructured":"Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. Def Con 21(2013), 260\u2013264.","journal-title":"Def Con"},{"key":"e_1_3_2_1_13_1","volume-title":"Black Hat USA 2015(2015)","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(2015), 91."},{"key":"e_1_3_2_1_14_1","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Europe 11(2015), 2015.","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_1_15_1","volume-title":"On The Manipulation of Wheel Speed Sensors and Their Impact in Autonomous Vehicles. In 2020 IEEE Intelligent Vehicles Symposium (IV). IEEE, 1530\u20131537","author":"P\u00f6llny Oliver","year":"2020","unstructured":"Oliver P\u00f6llny, Albert Held, and Frank Kargl. 2020. On The Manipulation of Wheel Speed Sensors and Their Impact in Autonomous Vehicles. In 2020 IEEE Intelligent Vehicles Symposium (IV). IEEE, 1530\u20131537."},{"key":"e_1_3_2_1_16_1","volume-title":"The Effect Of Sound On The Gyroscopes In Your Car. In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE, 1\u20135.","author":"P\u00f6llny Oliver","year":"2021","unstructured":"Oliver P\u00f6llny, Albert Held, and Frank Kargl. 2021. The Effect Of Sound On The Gyroscopes In Your Car. In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE, 1\u20135."},{"key":"e_1_3_2_1_17_1","volume-title":"19th USENIX Security Symposium (USENIX Security 10)","author":"Rouf Ishtiaq","year":"2010","unstructured":"Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar. 2010. Security and Privacy Vulnerabilities of {In-Car} Wireless Networks: A Tire Pressure Monitoring System Case Study. In 19th USENIX Security Symposium (USENIX Security 10), Vol.\u00a010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_19_1","volume-title":"Darts: Deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430(2018).","author":"Sitawarin Chawin","year":"2018","unstructured":"Chawin Sitawarin, Arjun\u00a0Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, and Prateek Mittal. 2018. Darts: Deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430(2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.902999"},{"key":"e_1_3_2_1_21_1","unstructured":"Tencent Keen Security Lab. 2019. Experimental Security Research of Tesla Autopilot. https:\/\/keenlab.tencent.com\/en\/whitepapers\/Experimental_Security_Research_of_Tesla_Autopilot.pdf"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Tu Yazhou","year":"2018","unstructured":"Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors. In 27th USENIX Security Symposium (USENIX Security 18). 1545\u20131562."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2017.15"},{"key":"e_1_3_2_1_25_1","unstructured":"E Yeh Junil Choi N Prelcic C Bhat and Robert\u00a0W Heath\u00a0Jr. 2016. Security in automotive radar and vehicular networks. submitted to Microwave Journal(2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"}],"event":{"name":"CSCS '22: Computer Science in Cars Symposium","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Ingolstadt Germany","acronym":"CSCS '22"},"container-title":["Proceedings of the 6th ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568160.3570228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568160.3570228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:26:15Z","timestamp":1750281975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568160.3570228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":26,"alternative-id":["10.1145\/3568160.3570228","10.1145\/3568160"],"URL":"https:\/\/doi.org\/10.1145\/3568160.3570228","relation":{},"subject":[],"published":{"date-parts":[[2022,12,8]]},"assertion":[{"value":"2022-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}