{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:39:37Z","timestamp":1756384777087,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595788","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"760-772","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6908-2057","authenticated-orcid":false,"given":"Oleg","family":"Schell","sequence":"first","affiliation":[{"name":"Robert Bosch GmbH, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2327-7059","authenticated-orcid":false,"given":"Marcel","family":"Kneib","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","author":"Abbott-McCune Sam","year":"2016","unstructured":"Sam Abbott-McCune and Lisa\u00a0 A. Shay . 2016 . Intrusion prevention system of automotive network CAN bus . 2016 IEEE International Carnahan Conference on Security Technology (ICCST) (2016), 1\u20138. Sam Abbott-McCune and Lisa\u00a0A. Shay. 2016. Intrusion prevention system of automotive network CAN bus. 2016 IEEE International Carnahan Conference on Security Technology (ICCST) (2016), 1\u20138."},{"key":"e_1_3_2_1_2_1","unstructured":"Milton Abramowitz and Irene\u00a0A Stegun. 1964. Handbook of mathematical functions with formulas graphs and mathematical tables. US Government printing office.  Milton Abramowitz and Irene\u00a0A Stegun. 1964. Handbook of mathematical functions with formulas graphs and mathematical tables. US Government printing office."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"e_1_3_2_1_4_1","unstructured":"Belden Inc. 2021. Belden 9842NH. https:\/\/catalog.belden.com\/techdata\/EN\/9842NH_techdata.pdf.  Belden Inc. 2021. Belden 9842NH. https:\/\/catalog.belden.com\/techdata\/EN\/9842NH_techdata.pdf."},{"volume-title":"Advances in Cryptology \u2014 CRYPTO \u201998","author":"Bellovin M.","key":"e_1_3_2_1_5_1","unstructured":"Steven\u00a0 M. Bellovin . 1998. Cryptography and the internet . In Advances in Cryptology \u2014 CRYPTO \u201998 , Hugo Krawczyk (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 46\u201355. Steven\u00a0M. Bellovin. 1998. Cryptography and the internet. In Advances in Cryptology \u2014 CRYPTO \u201998, Hugo Krawczyk (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 46\u201355."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR)(16)","author":"Biham Eli","year":"2018","unstructured":"Eli Biham , Sara Bitan , and Eli Gavril . 2018 . TCAN: Authentication Without Cryptography on a CAN Bus Based on Nodes Location on the Bus . In Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR)(16) . Eli Biham, Sara Bitan, and Eli Gavril. 2018. TCAN: Authentication Without Cryptography on a CAN Bus Based on Nodes Location on the Bus. In Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR)(16)."},{"key":"e_1_3_2_1_7_1","volume-title":"Abschlussbericht: Experteninterview zur Anforderungsanalyse heutiger und zuk\u00fcnftiger E\/E Architekturen im Kraftfahrzeug.","author":"Braun Lisa","year":"2016","unstructured":"Lisa Braun , Eric Sax , and Frank Gauterin . 2016 . Abschlussbericht: Experteninterview zur Anforderungsanalyse heutiger und zuk\u00fcnftiger E\/E Architekturen im Kraftfahrzeug. DOI: 10.5445\/IR\/1000054216. 10.5445\/IR Lisa Braun, Eric Sax, and Frank Gauterin. 2016. Abschlussbericht: Experteninterview zur Anforderungsanalyse heutiger und zuk\u00fcnftiger E\/E Architekturen im Kraftfahrzeug. DOI: 10.5445\/IR\/1000054216."},{"volume-title":"Cybersecurity in automotive: Mastering the challenge. https:\/\/www.gsaglobal.org\/wp-content\/uploads\/2020\/03\/Cybersecurity-in-automotive-Mastering-the-challenge.pdf","author":"Burkacky Ondrej","key":"e_1_3_2_1_8_1","unstructured":"Ondrej Burkacky , Johannes Deichmann , Benjamin Klein , Klaus Pototzky , and Gundbert Scherf . 2020. Cybersecurity in automotive: Mastering the challenge. https:\/\/www.gsaglobal.org\/wp-content\/uploads\/2020\/03\/Cybersecurity-in-automotive-Mastering-the-challenge.pdf . McKinsey & Company . Ondrej Burkacky, Johannes Deichmann, Benjamin Klein, Klaus Pototzky, and Gundbert Scherf. 2020. Cybersecurity in automotive: Mastering the challenge. https:\/\/www.gsaglobal.org\/wp-content\/uploads\/2020\/03\/Cybersecurity-in-automotive-Mastering-the-challenge.pdf. McKinsey & Company."},{"key":"e_1_3_2_1_9_1","volume-title":"Black Hat USA 2019","author":"Cai Zhiqiang","year":"2019","unstructured":"Zhiqiang Cai , Aohui Wang , Wenkai Zhang , Michael Gruffke , and Hendrick Schweppe . 2019 . 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars . Black Hat USA 2019 (2019), 39. Zhiqiang Cai, Aohui Wang, Wenkai Zhang, Michael Gruffke, and Hendrick Schweppe. 2019. 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars. Black Hat USA 2019 (2019), 39."},{"key":"e_1_3_2_1_10_1","volume-title":"CAN XL is knocking at the door. (Jan","author":"Automation CAN","year":"2020","unstructured":"CAN in Automation . 2020. CAN XL is knocking at the door. (Jan . 2020 ). https:\/\/www.can-cia.org\/news\/cia-in-action\/view\/can-xl-is-knocking-at-the-door\/2020\/1\/3\/ CAN in Automation. 2020. CAN XL is knocking at the door. (Jan. 2020). https:\/\/www.can-cia.org\/news\/cia-in-action\/view\/can-xl-is-knocking-at-the-door\/2020\/1\/3\/"},{"key":"e_1_3_2_1_11_1","unstructured":"CAN in Automation. 2021. SIG CAN XL. https:\/\/www.can-cia.org\/groups\/technical-groups\/technical-committee-tc\/ig-layer-12\/sig-can-xl\/.  CAN in Automation. 2021. SIG CAN XL. https:\/\/www.can-cia.org\/groups\/technical-groups\/technical-committee-tc\/ig-layer-12\/sig-can-xl\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/TIFS.2018.2812149","article-title":"VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System","volume":"13","author":"Choi W.","year":"2018","unstructured":"W. Choi , K. Joo , H.\u00a0 J. Jo , M.\u00a0 C. Park , and D.\u00a0 H. Lee . 2018 . VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System . IEEE Transactions on Information Forensics and Security 13 , 8 (Aug 2018), 2114\u20132129. W. Choi, K. Joo, H.\u00a0J. Jo, M.\u00a0C. Park, and D.\u00a0H. Lee. 2018. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Transactions on Information Forensics and Security 13, 8 (Aug 2018), 2114\u20132129.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_15_1","unstructured":"Steve Corrigan. 2008. Critical Spacing of CAN Bus Connections. Application Report. Texas Instruments.  Steve Corrigan. 2008. Critical Spacing of CAN Bus Connections. Application Report. Texas Instruments."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 35th Annual Computer Security Applications Conference(ACSAC \u201919)","author":"Foruhandeh Mahsa","year":"2019","unstructured":"Mahsa Foruhandeh , Yanmao Man , Ryan Gerdes , Ming Li , and Thidapat Chantem . 2019 . SIMPLE: Single-frame Based Physical Layer Identification for Intrusion Detection and Prevention on In-vehicle Networks . In Proceedings of the 35th Annual Computer Security Applications Conference(ACSAC \u201919) . 229\u2013244. Mahsa Foruhandeh, Yanmao Man, Ryan Gerdes, Ming Li, and Thidapat Chantem. 2019. SIMPLE: Single-frame Based Physical Layer Identification for Intrusion Detection and Prevention on In-vehicle Networks. In Proceedings of the 35th Annual Computer Security Applications Conference(ACSAC \u201919). 229\u2013244."},{"key":"e_1_3_2_1_17_1","volume-title":"Computer Security \u2013 ESORICS","author":"Groza Bogdan","year":"2021","unstructured":"Bogdan Groza , Pal-Stefan Murvay , Lucian Popa , and Camil Jichici . 2021. CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses . In Computer Security \u2013 ESORICS 2021 , Elisa Bertino, Haya Shulman , and Michael Waidner (Eds.). Springer International Publishing , Cham, 668\u2013690. Bogdan Groza, Pal-Stefan Murvay, Lucian Popa, and Camil Jichici. 2021. CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses. In Computer Security \u2013 ESORICS 2021, Elisa Bertino, Haya Shulman, and Michael Waidner (Eds.). Springer International Publishing, Cham, 668\u2013690."},{"key":"e_1_3_2_1_18_1","unstructured":"Markus Hanselmann Thilo Strauss Katharina Dormann and Holger Ulmer. 2019. CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data. (2019). http:\/\/arxiv.org\/abs\/1906.02492  Markus Hanselmann Thilo Strauss Katharina Dormann and Holger Ulmer. 2019. CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data. (2019). http:\/\/arxiv.org\/abs\/1906.02492"},{"key":"e_1_3_2_1_19_1","unstructured":"Daniel\u00a0Hopf Helge\u00a0Zinner Julian\u00a0Brand. 2019. Automotive E\/E Architecture evolution and the impact on the network. IEEE802 Plenary (2019).  Daniel\u00a0Hopf Helge\u00a0Zinner Julian\u00a0Brand. 2019. Automotive E\/E Architecture evolution and the impact on the network. IEEE802 Plenary (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_1_21_1","article-title":"Cyber-physical systems security - A survey","volume":"4","author":"Humayed Abdulmalik","year":"2017","unstructured":"Abdulmalik Humayed , Jingqiang Lin , Fengjun Li , and Bo Luo . 2017 . Cyber-physical systems security - A survey . IEEE Internet of Things Journal 4 , 6 (2017). Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security - A survey. IEEE Internet of Things Journal 4, 6 (2017).","journal-title":"IEEE Internet of Things Journal"},{"volume-title":"Road vehicles \u2013 Controller area network (CAN) \u2013 Part 1: Data link layer and physical signalling (2 ed.). Standard","author":"ISO","key":"e_1_3_2_1_22_1","unstructured":"ISO 11898-1:2015. 2015. Road vehicles \u2013 Controller area network (CAN) \u2013 Part 1: Data link layer and physical signalling (2 ed.). Standard . International Organization for Standardization , Geneva, CH . ISO 11898-1:2015. 2015. Road vehicles \u2013 Controller area network (CAN) \u2013 Part 1: Data link layer and physical signalling (2 ed.). Standard. International Organization for Standardization, Geneva, CH."},{"volume-title":"Road vehicles \u2013 Controller area network (CAN) \u2013 Part 2: High-speed medium access unit (2 ed.). Standard","author":"ISO","key":"e_1_3_2_1_23_1","unstructured":"ISO 11898-2:2016. 2016. Road vehicles \u2013 Controller area network (CAN) \u2013 Part 2: High-speed medium access unit (2 ed.). Standard . International Organization for Standardization , Geneva, CH . ISO 11898-2:2016. 2016. Road vehicles \u2013 Controller area network (CAN) \u2013 Part 2: High-speed medium access unit (2 ed.). Standard. International Organization for Standardization, Geneva, CH."},{"volume-title":"Road Vehicles \u2013 Functional safety. Standard","author":"ISO","key":"e_1_3_2_1_24_1","unstructured":"ISO 26262. 2018. Road Vehicles \u2013 Functional safety. Standard . International Organization for Standardization , Geneva, CH . ISO 26262. 2018. Road Vehicles \u2013 Functional safety. Standard. International Organization for Standardization, Geneva, CH."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3059881"},{"key":"e_1_3_2_1_26_1","unstructured":"Daan Keuper and Alkemade Thijs. 2018. The connected car: Ways to get unauthorized access and potential implications. https:\/\/www.computest.nl\/wp-content\/uploads\/2018\/04\/connected-car-rapport.pdf. Computest.  Daan Keuper and Alkemade Thijs. 2018. The connected car: Ways to get unauthorized access and potential implications. https:\/\/www.computest.nl\/wp-content\/uploads\/2018\/04\/connected-car-rapport.pdf. Computest."},{"key":"e_1_3_2_1_27_1","volume-title":"SICHERHEIT 2020","author":"Kneib Marcel","year":"2020","unstructured":"Marcel Kneib . 2020 . A Survey on Sender Identification Methodologies for the Controller Area Network . In SICHERHEIT 2020 , Delphine Reinhardt, Hanno Langweg, Bernhard\u00a0C. Witt, and Mathias Fischer (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 91\u2013103. https:\/\/doi.org\/10. 18420\/sicherheit2020_07 10.18420\/sicherheit2020_07 Marcel Kneib. 2020. A Survey on Sender Identification Methodologies for the Controller Area Network. In SICHERHEIT 2020, Delphine Reinhardt, Hanno Langweg, Bernhard\u00a0C. Witt, and Mathias Fischer (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 91\u2013103. https:\/\/doi.org\/10.18420\/sicherheit2020_07"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 27th Network and Distributed System Security Symposium.","author":"Kneib Marcel","year":"2020","unstructured":"Marcel Kneib , Oleg Schell , and Christopher Huth . 2020 . EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks . In Proceedings of the 27th Network and Distributed System Security Symposium. Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. In Proceedings of the 27th Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"CANvas: Fast and Inexpensive Automotive Network Mapping. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Kulandaivel Sekar","year":"2019","unstructured":"Sekar Kulandaivel , Tushar Goyal , Arnav\u00a0Kumar Agrawal , and Vyas Sekar . 2019 . CANvas: Fast and Inexpensive Automotive Network Mapping. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, 389\u2013405. Sekar Kulandaivel, Tushar Goyal, Arnav\u00a0Kumar Agrawal, and Vyas Sekar. 2019. CANvas: Fast and Inexpensive Automotive Network Mapping. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 389\u2013405."},{"key":"e_1_3_2_1_31_1","unstructured":"Dan Larsson and Jonas Hemlin. 2015. Exploring the Generic Timer Module\u2019s Feasibility for Truck Powertrain Control. http:\/\/publications.lib.chalmers.se\/records\/fulltext\/219127\/219127.pdf.  Dan Larsson and Jonas Hemlin. 2015. Exploring the Generic Timer Module\u2019s Feasibility for Truck Powertrain Control. http:\/\/publications.lib.chalmers.se\/records\/fulltext\/219127\/219127.pdf."},{"key":"e_1_3_2_1_32_1","volume-title":"CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs\/2106.07895","author":"Levy Efrat","year":"2021","unstructured":"Efrat Levy , Asaf Shabtai , Bogdan Groza , Pal-Stefan Murvay , and Yuval Elovici . 2021. CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs\/2106.07895 ( 2021 ). arXiv:2106.07895https:\/\/arxiv.org\/abs\/2106.07895 Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, and Yuval Elovici. 2021. CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs\/2106.07895 (2021). arXiv:2106.07895https:\/\/arxiv.org\/abs\/2106.07895"},{"volume-title":"Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In 2012 International Conference on Cyber Security. IEEE","author":"Lin W.","key":"e_1_3_2_1_33_1","unstructured":"C.\u00a0 W. Lin and A. Sangiovanni-Vincentelli . 2012 . Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In 2012 International Conference on Cyber Security. IEEE , New York, NY, 1\u20137. C.\u00a0W. Lin and A. Sangiovanni-Vincentelli. 2012. Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In 2012 International Conference on Cyber Security. IEEE, New York, NY, 1\u20137."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"e_1_3_2_1_35_1","unstructured":"Microchip Technology Inc.2007. MCP2551 High-Speed CAN Transceiver. http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/21667e.pdf.  Microchip Technology Inc.2007. MCP2551 High-Speed CAN Transceiver. http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/21667e.pdf."},{"key":"e_1_3_2_1_36_1","unstructured":"Microchip Technology Inc.2016. MCP2557FD\/8FD CAN FD Transceiver with Silent Mode. https:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/20005533A.pdf. Revision A.  Microchip Technology Inc.2016. MCP2557FD\/8FD CAN FD Transceiver with Silent Mode. https:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/20005533A.pdf. Revision A."},{"key":"e_1_3_2_1_37_1","volume-title":"DEF CON 21 Hacking Conference.","author":"Miller Charlie","year":"2013","unstructured":"Charlie Miller and Chris Valasek . 2013 . Adventures in automotive networks and control units . DEF CON 21 Hacking Conference. Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. DEF CON 21 Hacking Conference."},{"key":"e_1_3_2_1_38_1","volume-title":"Black Hat USA 2015","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015 . Remote exploitation of an unaltered passenger vehicle . Black Hat USA 2015 (2015), 91. Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015 (2015), 91."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 5th International Conference on Information Systems Security and Privacy -","author":"Moreno Carlos","year":"2019","unstructured":"Carlos Moreno and Sebastian Fischmeister . 2019 . Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter . In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. SciTePress. Carlos Moreno and Sebastian Fischmeister. 2019. Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter. In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. SciTePress."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985326"},{"key":"e_1_3_2_1_41_1","volume-title":"2010 Sixth International Conference on Information Assurance and Security. IEEE","author":"M\u00fcter Michael","year":"2010","unstructured":"Michael M\u00fcter , Andr\u00e9 Groll , and Felix\u00a0 C. Freiling . 2010 . A structured approach to anomaly detection for in-vehicle networks . In 2010 Sixth International Conference on Information Assurance and Security. IEEE , New York, NY, 92\u201398. Michael M\u00fcter, Andr\u00e9 Groll, and Felix\u00a0C. Freiling. 2010. A structured approach to anomaly detection for in-vehicle networks. In 2010 Sixth International Conference on Information Assurance and Security. IEEE, New York, NY, 92\u201398."},{"key":"e_1_3_2_1_42_1","unstructured":"Sen Nie Ling Liu Yuefeng Du and Wenkai Zhang. 2018. Over-the-air: How we remotely compromised the gateway BCM and autopilot ECUs of Tesla cars. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Liu-Over-The-Air-How-We-Remotely-Compromised-The-Gateway-Bcm-And-Autopilot-Ecus-Of-Tesla-Cars-wp.pdf Published: Black Hat USA 2018.  Sen Nie Ling Liu Yuefeng Du and Wenkai Zhang. 2018. Over-the-air: How we remotely compromised the gateway BCM and autopilot ECUs of Tesla cars. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Liu-Over-The-Air-How-We-Remotely-Compromised-The-Gateway-Bcm-And-Autopilot-Ecus-Of-Tesla-Cars-wp.pdf Published: Black Hat USA 2018."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437530"},{"key":"e_1_3_2_1_44_1","volume-title":"SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . 2020 . SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20) . Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_45_1","volume-title":"ACM Computer Science in Cars Symposium","author":"Ring Martin","year":"2018","unstructured":"Martin Ring , Davor Frkat , and Martin Schmiedecker . 2018 . Cybersecurity Evaluation of Automotive E\/E Architectures. 2 . ACM Computer Science in Cars Symposium (2018). Martin Ring, Davor Frkat, and Martin Schmiedecker. 2018. Cybersecurity Evaluation of Automotive E\/E Architectures. 2. ACM Computer Science in Cars Symposium (2018)."},{"key":"e_1_3_2_1_46_1","unstructured":"Robert Bosch GmbH. 1991. CAN Specification v2.0. http:\/\/esd.cs.ucr.edu\/webres\/can20.pdf.  Robert Bosch GmbH. 1991. CAN Specification v2.0. http:\/\/esd.cs.ucr.edu\/webres\/can20.pdf."},{"key":"e_1_3_2_1_47_1","unstructured":"Robert Bosch GmbH. 2012. CAN with Flexible Data-Rate Specification Version 1.0. https:\/\/can-newsletter.org\/assets\/files\/ttmedia\/raw\/e5740b7b5781b8960f55efcc2b93edf8.pdf. Version 1.0.  Robert Bosch GmbH. 2012. CAN with Flexible Data-Rate Specification Version 1.0. https:\/\/can-newsletter.org\/assets\/files\/ttmedia\/raw\/e5740b7b5781b8960f55efcc2b93edf8.pdf. Version 1.0."},{"key":"e_1_3_2_1_48_1","volume-title":"Silently disabling ECUs and enabling blind attacks on the CAN bus. arXiv preprint arXiv:2201.06362","author":"Rogers Matthew","year":"2022","unstructured":"Matthew Rogers and Kasper Rasmussen . 2022. Silently disabling ECUs and enabling blind attacks on the CAN bus. arXiv preprint arXiv:2201.06362 ( 2022 ). Matthew Rogers and Kasper Rasmussen. 2022. Silently disabling ECUs and enabling blind attacks on the CAN bus. arXiv preprint arXiv:2201.06362 (2022)."},{"key":"e_1_3_2_1_49_1","volume-title":"Embedded system design for automotive applications. Computer 40, 10","author":"Sangiovanni-Vincentelli Alberto","year":"2007","unstructured":"Alberto Sangiovanni-Vincentelli and Marco Di\u00a0Natale . 2007. Embedded system design for automotive applications. Computer 40, 10 ( 2007 ). Alberto Sangiovanni-Vincentelli and Marco Di\u00a0Natale. 2007. Embedded system design for automotive applications. Computer 40, 10 (2007)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"O. Schell and M. Kneib. 2020. VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. In 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom).  O. Schell and M. Kneib. 2020. VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. In 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom).","DOI":"10.1109\/TrustCom50675.2020.00041"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3217382"},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Computer Safety, Reliability, and Security. Springer, 319\u2013330","author":"Souma Daisuke","year":"2018","unstructured":"Daisuke Souma , Akira Mori , Hideki Yamamoto , and Yoichi Hata . 2018 . Counter attacks for bus-off attacks . In International Conference on Computer Safety, Reliability, and Security. Springer, 319\u2013330 . Daisuke Souma, Akira Mori, Hideki Yamamoto, and Yoichi Hata. 2018. Counter attacks for bus-off attacks. In International Conference on Computer Safety, Reliability, and Security. Springer, 319\u2013330."},{"key":"e_1_3_2_1_53_1","first-page":"1","article-title":"A taxonomy of intrusion response systems","volume":"1","author":"Stakhanova Natalia","year":"2007","unstructured":"Natalia Stakhanova , Samik Basu , and Johnny Wong . 2007 . A taxonomy of intrusion response systems . International Journal of Information and Computer Security 1 , 1 - 2 (2007), 169\u2013184. Natalia Stakhanova, Samik Basu, and Johnny Wong. 2007. A taxonomy of intrusion response systems. International Journal of Information and Computer Security 1, 1-2 (2007), 169\u2013184.","journal-title":"International Journal of Information and Computer Security"},{"key":"e_1_3_2_1_54_1","unstructured":"STMicroelectronics. 2020. STM32 Nucleo-144 boards. https:\/\/www.st.com\/resource\/en\/data_brief\/nucleo-h743zi.pdf. Revision 13.  STMicroelectronics. 2020. STM32 Nucleo-144 boards. https:\/\/www.st.com\/resource\/en\/data_brief\/nucleo-h743zi.pdf. Revision 13."},{"key":"e_1_3_2_1_55_1","volume-title":"2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 96\u2013102","author":"Takada Masaru","year":"2019","unstructured":"Masaru Takada , Yuki Osada , and Masakatu Morii . 2019 . Counter attack against the bus-off attack on CAN . In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 96\u2013102 . Masaru Takada, Yuki Osada, and Masakatu Morii. 2019. Counter attack against the bus-off attack on CAN. In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 96\u2013102."},{"key":"e_1_3_2_1_56_1","unstructured":"Tencent Keen Security Lab. 2020. Experimental Security Assessment on Lexus Cars. https:\/\/keenlab.tencent.com\/en\/2020\/03\/30\/Tencent-Keen-Security-Lab-Experimental-Security-Assessment-on-Lexus-Cars\/.  Tencent Keen Security Lab. 2020. Experimental Security Assessment on Lexus Cars. https:\/\/keenlab.tencent.com\/en\/2020\/03\/30\/Tencent-Keen-Security-Lab-Experimental-Security-Assessment-on-Lexus-Cars\/."},{"key":"e_1_3_2_1_57_1","unstructured":"Texas Instruments. 2016. TDC7201 Time-to-Digital Converter for Time-of-Flight Applications in LIDAR Range Finders and ADAS. https:\/\/www.ti.com\/lit\/gpn\/tdc7201.  Texas Instruments. 2016. TDC7201 Time-to-Digital Converter for Time-of-Flight Applications in LIDAR Range Finders and ADAS. https:\/\/www.ti.com\/lit\/gpn\/tdc7201."},{"key":"e_1_3_2_1_58_1","unstructured":"Texas Instruments. 2021. SN65HVD23x3.3-V CAN Bus Transceivers. https:\/\/www.ti.com\/lit\/gpn\/sn65hvd230.  Texas Instruments. 2021. SN65HVD23x3.3-V CAN Bus Transceivers. https:\/\/www.ti.com\/lit\/gpn\/sn65hvd230."},{"key":"e_1_3_2_1_59_1","unstructured":"UN Task Force on Cyber Security and Over-The-Air issues. 2020. Proposal for the 01 series of amendments to the new UN Regulation on uniform provisions concerning the approval of vehicles with regard to cyber security and of cybersecurity management systems. https:\/\/undocs.org\/en\/ECE\/TRANS\/WP.29\/GRVA\/2020\/3  UN Task Force on Cyber Security and Over-The-Air issues. 2020. Proposal for the 01 series of amendments to the new UN Regulation on uniform provisions concerning the approval of vehicles with regard to cyber security and of cybersecurity management systems. https:\/\/undocs.org\/en\/ECE\/TRANS\/WP.29\/GRVA\/2020\/3"},{"key":"e_1_3_2_1_60_1","volume-title":"2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).","author":"Wang Qian","year":"2018","unstructured":"Qian Wang , Yiming Qian , Zhaojun Lu , Yasser Shoukry , and Gang Qu . 2018 . A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network . In 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). Qian Wang, Yiming Qian, Zhaojun Lu, Yasser Shoukry, and Gang Qu. 2018. A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network. In 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1962.10490022"},{"key":"e_1_3_2_1_62_1","article-title":"BTMonitor: Bit-Time-Based Intrusion Detection and Attacker Identification in Controller Area Network","volume":"18","author":"Zhou Jia","year":"2019","unstructured":"Jia Zhou , Prachi Joshi , Haibo Zeng , and Renfa Li . 2019 . BTMonitor: Bit-Time-Based Intrusion Detection and Attacker Identification in Controller Area Network . ACM Trans. Embed. Comput. Syst. 18 , 6, Article 117 (Nov 2019). Jia Zhou, Prachi Joshi, Haibo Zeng, and Renfa Li. 2019. BTMonitor: Bit-Time-Based Intrusion Detection and Attacker Identification in Controller Area Network. ACM Trans. Embed. Comput. Syst. 18, 6, Article 117 (Nov 2019).","journal-title":"ACM Trans. Embed. Comput. Syst."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":62,"alternative-id":["10.1145\/3579856.3595788","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595788","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}