{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:34:36Z","timestamp":1778344476150,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Information & Communications Technology Planning & Evaluation (IITP)","award":["2020-0-00866"],"award-info":[{"award-number":["2020-0-00866"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583650","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5638-2851","authenticated-orcid":false,"given":"Seonghoon","family":"Jeong","sequence":"first","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4725-8768","authenticated-orcid":false,"given":"Minsoo","family":"Ryu","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2044-1711","authenticated-orcid":false,"given":"Hyunjae","family":"Kang","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0760-8807","authenticated-orcid":false,"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BlackBerry. 2022. BlackBerry QNX. https:\/\/blackberry.qnx.com."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Tim Bray. 2014. The JavaScript Object Notation (JSON) Data Interchange Format. RFC 7159. https:\/\/www.rfc-editor.org\/info\/rfc7159","DOI":"10.17487\/rfc7158"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars","volume":"39","author":"Cai Zhiqiang","year":"2019","unstructured":"Zhiqiang Cai, Aohui Wang, and Wenkai Zhang. 2019. 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars. In Black Hat USA, Vol. 39. 1--37.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.43"},{"key":"e_1_3_2_1_5_1","volume-title":"2018 IEEE International Conference on Electro\/Information Technology (EIT). 0438--0443","author":"Chordiya Ankita R","year":"2018","unstructured":"Ankita R Chordiya, Subhrajit Majumder, and Ahmad Y Javaid. 2018. Man-in-the-Middle (MI\u2122) Attack Based Hijacking of HTTP Traffic Using Open Source Tools. In 2018 IEEE International Conference on Electro\/Information Technology (EIT). 0438--0443."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00094"},{"key":"e_1_3_2_1_8_1","unstructured":"Scott Gayou. 2018. Jailbreaking Subaru StarLink. https:\/\/github.com\/sgayou\/subaru-starlink-research."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. 2022. Android Automotive OS (AAOS). https:\/\/developers.google.com\/cars\/design\/automotive-os."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705027"},{"key":"e_1_3_2_1_11_1","unstructured":"Institute for Information & Communications Technology Planning & Evaluation (IITP). 2021a. 2021 Cyber Security Challenge: the final round (in Korean). https:\/\/youtu.be\/E-ZTuWSg-JU."},{"key":"e_1_3_2_1_12_1","unstructured":"Institute for Information & Communications Technology Planning & Evaluation (IITP). 2021b. Call for Challenge: 2021 Cyber Security Challenge (in Korean). https:\/\/youtu.be\/HS2PfBpwjU4."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3618-9"},{"key":"e_1_3_2_1_15_1","first-page":"9","article-title":"Infotainment Enabled Smart Cars: A Joint Communication, Caching, and Computation Approach","volume":"68","author":"Ahsan Kazmi S. M.","year":"2019","unstructured":"S. M. Ahsan Kazmi, Tri Nguyen Dang, Ibrar Yaqoob, Anselme Ndikumana, Ejaz Ahmed, Rasheed Hussain, and Choong Seon Hong. 2019. Infotainment Enabled Smart Cars: A Joint Communication, Caching, and Computation Approach. IEEE Transactions on Vehicular Technology , Vol. 68, 9 (Sep. 2019), 8408--8420.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3027019.3027040"},{"key":"e_1_3_2_1_18_1","unstructured":"Alexey Melnikov and Ian Fette. 2011. The WebSocket Protocol. RFC 6455. https:\/\/www.rfc-editor.org\/info\/rfc6455"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2018.2863106"},{"key":"e_1_3_2_1_20_1","unstructured":"Charlie Miller and Chris Valasek. 2014. A survey of remote automotive attack surfaces. In Black Hat USA."},{"key":"e_1_3_2_1_21_1","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. In Black Hat USA. 1--91."},{"key":"e_1_3_2_1_22_1","volume-title":"BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY. International Journal of Distributed and Parallel systems","author":"Be-Nazir Ibn Nateq","year":"2012","unstructured":"Nateq Be-Nazir Ibn Minar and Mohammed Tarique. 2012. BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY. International Journal of Distributed and Parallel systems, Vol. 3, 1 (2012), 127--148."},{"key":"e_1_3_2_1_23_1","volume-title":"2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS). 17--24","author":"Moiz Abdul","unstructured":"Abdul Moiz and Manar H. Alalfi. 2022. A Survey of Security Vulnerabilities in Android Automotive Apps. In 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS). 17--24."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Free-fall: Hacking Tesla from wireless to CAN bus","volume":"25","author":"Nie Sen","year":"2017","unstructured":"Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-fall: Hacking Tesla from wireless to CAN bus. In Black Hat USA, Vol. 25. 1--16.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_25_1","volume-title":"Guide to Bluetooth Security","author":"National Institute of Standards and Technology. 2017.","unstructured":"National Institute of Standards and Technology. 2017. Guide to Bluetooth Security. Technical Report Special Publications 800--121 Revison 2. U.S. Department of Commerce, Washington, D.C."},{"key":"e_1_3_2_1_26_1","unstructured":"OpenWeatherMap Ltd. 2022. OpenWeatherMap. https:\/\/openweathermap.org"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.11.002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"e_1_3_2_1_29_1","unstructured":"Tencent Keen Security Lab. 2020. Experimental Security Assessment on Lexus Cars. https:\/\/keenlab.tencent.com\/en\/2020\/03\/30\/Tencent-Keen-Security-Lab-Experimental-Security-Assessment-on-Lexus-Cars\/."},{"key":"e_1_3_2_1_31_1","unstructured":"The Linux Foundation. 2016. Automotive Grade Linux. https:\/\/www.automotivelinux.org."},{"key":"e_1_3_2_1_32_1","unstructured":"The Linux Foundation. 2020. Git Repository: agl-service-weather\/afm-weather-binding.c. https:\/\/git.automotivelinux.org\/apps\/agl-service-weather\/tree\/binding\/afm-weather-binding.c?id=3b723a2f50dc467607a6e8b6d9c41e2d18cef17e"},{"key":"e_1_3_2_1_33_1","unstructured":"The OpenStreetMap Foundation. 2022. OpenStreetMap. https:\/\/www.openstreetmap.org"},{"key":"e_1_3_2_1_34_1","unstructured":"Trifinite. 2004. BlueBug. https:\/\/trifinite.org\/stuff\/bluebug\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","location":"Charlotte NC USA","acronym":"CODASPY '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":34,"alternative-id":["10.1145\/3577923.3583650","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583650","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}