{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:55:54Z","timestamp":1775066154661,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hessian Ministry of Higher Education, Research, Science and the Arts"},{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)"},{"name":"German Federal Ministry of Education and Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627127","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"298-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Detection of Anomalies in Electric Vehicle Charging Sessions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4365-1762","authenticated-orcid":false,"given":"Dustin","family":"Kern","sequence":"first","affiliation":[{"name":"Darmstadt University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7574","authenticated-orcid":false,"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9163-5989","authenticated-orcid":false,"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Plug In Electric Vehicles in Smart Grids","author":"Abedi Sajjad","unstructured":"Sajjad Abedi, Ata Arvani, and Reza Jamalzadeh. 2015. Cyber security of plug-in electric vehicles in smart grids: application of intrusion detection methods. In Plug In Electric Vehicles in Smart Grids. Springer, 129\u2013147."},{"key":"e_1_3_2_1_2_1","volume-title":"Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable?IEEE Transactions on Smart Grid","author":"Acharya Samrat","year":"2020","unstructured":"Samrat Acharya, Yury Dvorkin, and Ramesh Karri. 2020. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable?IEEE Transactions on Smart Grid (2020)."},{"key":"e_1_3_2_1_3_1","volume-title":"Perspectives on Security Alarms. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Alahmadi A","year":"2022","unstructured":"Bushra\u00a0A Alahmadi, Louise Axon, and Ivan Martinovic. 2022. 99% False Positives: A Qualitative Study of { SOC} Analysts\u2019 Perspectives on Security Alarms. In 31st USENIX Security Symposium (USENIX Security 22). 2783\u20132800."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101994"},{"key":"e_1_3_2_1_5_1","volume-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"Case Defense\u00a0Use","year":"2016","unstructured":"Defense\u00a0Use Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2016)."},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium, Vol.\u00a04","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, 2011. Comprehensive experimental analyses of automotive attack surfaces.. In USENIX Security Symposium, Vol.\u00a04. San Francisco, 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3518997.3534995"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC48692.2020.9161576"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"David Coats Harish Suryanarayana Zhenyuan Wang Alex Brissette Yuzhi Zhang VR Ramanan Don Scoffield Duncan Woodbury Nick Haltmeyer and Austin Benzinger. 2021. Cybersecurity for Grid Connected eXtreme Fast Charging (XFC) Station (CyberX). Technical Report. ABB Inc.","DOI":"10.2172\/1835523"},{"key":"e_1_3_2_1_10_1","volume-title":"Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736","author":"Cumplido Jesus","year":"2022","unstructured":"Jesus Cumplido, Cristina Alcaraz, and Javier Lopez. 2022. Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736."},{"key":"e_1_3_2_1_11_1","unstructured":"Mathias Dalheimer. 2017. Chaos Computer Club hacks e-motor charging stations. https:\/\/www.ccc.de\/en\/updates\/2017\/e-motor"},{"key":"e_1_3_2_1_12_1","volume-title":"Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging","author":"Dey Satadru","year":"2020","unstructured":"Satadru Dey and Munmun Khanra. 2020. Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging. IEEE Transactions on Industrial Electronics (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"ElaadNL. 2019. ElaadNL Open EV Charging Transactions. platform.elaad.io\/download-data\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437258"},{"key":"e_1_3_2_1_15_1","unstructured":"Federal\u00a0Office for Information\u00a0Security. 2023. FAQ on attack detection systems. https:\/\/www.bsi.bund.de\/EN\/Themen\/KRITIS-und-regulierte-Unternehmen\/Kritische-Infrastrukturen\/KRITIS-FAQ\/FAQ-Systeme-Angriffserkennung\/faq-systeme-angriffserkennung_node.html"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2210288"},{"key":"e_1_3_2_1_18_1","volume-title":"d.]. Global EV Outlook","author":"IEA.","year":"2022","unstructured":"IEA. [n. d.]. Global EV Outlook 2022. www.iea.org\/reports\/global-ev-outlook-2022"},{"key":"e_1_3_2_1_19_1","first-page":"15118","article-title":"Road vehicles \u2013 Vehicle-to-Grid Communication Interface \u2013 Part 2: Network and application protocol requirements","author":"IEC.","year":"2014","unstructured":"ISO\/IEC. 2014. Road vehicles \u2013 Vehicle-to-Grid Communication Interface \u2013 Part 2: Network and application protocol requirements. ISO Standard 15118-2.","journal-title":"ISO Standard"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.28991\/esj-2021-01314"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3083696"},{"key":"e_1_3_2_1_23_1","volume-title":"An Effective Anomaly Detection Model for Securing Communications in Electric Vehicles","author":"Kavousi-Fard Abdollah","year":"2020","unstructured":"Abdollah Kavousi-Fard, Tao Jin, Wencong Su, and Navid Parsa. 2020. An Effective Anomaly Detection Model for Securing Communications in Electric Vehicles. IEEE Transactions on Industry Applications (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488904.3493385"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00042"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307772.3328313"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"e_1_3_2_1_28_1","volume-title":"False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security","author":"Liu Yao","year":"2011","unstructured":"Yao Liu, Peng Ning, and Michael Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (2011)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/en11113207"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647758"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TSTE.2016.2615865","article-title":"Cost-constrained dynamic optimal electric vehicle charging","volume":"8","author":"Crow Maigha","year":"2016","unstructured":"Maigha and M.\u00a0L. Crow. 2016. Cost-constrained dynamic optimal electric vehicle charging. IEEE Transactions on Sustainable Energy 8, 2 (2016), 716\u2013724.","journal-title":"IEEE Transactions on Sustainable Energy"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2705188"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083060"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2019.8791598"},{"key":"e_1_3_2_1_36_1","volume-title":"Open Charge Point Protocol 2.0.1. Open Standard","author":"OCA.","unstructured":"OCA. 2020. Open Charge Point Protocol 2.0.1. Open Standard. Open Charge Alliance, Netherlands. www.openchargealliance.org\/protocols\/ocpp-201\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_38_1","volume-title":"A review of novelty detection. Signal processing 99","author":"Pimentel AF","year":"2014","unstructured":"Marco\u00a0AF Pimentel, David\u00a0A Clifton, Lei Clifton, and Lionel Tarassenko. 2014. A review of novelty detection. Signal processing 99 (2014), 215\u2013249."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909807"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465750"},{"key":"e_1_3_2_1_41_1","first-page":"800","article-title":"Developing Cyber Resilient Systems","author":"Ross Ron","year":"2019","unstructured":"Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, and Rosalie McQuaid. 2019. Developing Cyber Resilient Systems: A Systems Security Engineering Approach. NIST SP 800-160.","journal-title":"A Systems Security Engineering Approach. NIST SP"},{"key":"e_1_3_2_1_42_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 458\u2013463","author":"Sagstetter Florian","year":"2013","unstructured":"Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William\u00a0R Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty. 2013. Security challenges in automotive hardware\/software architecture design. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 458\u2013463."},{"key":"e_1_3_2_1_43_1","volume-title":"Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids. arXiv preprint arXiv:2308.07526","author":"Sayed Mohammad\u00a0Ali","year":"2023","unstructured":"Mohammad\u00a0Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, and Chadi Assi. 2023. Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids. arXiv preprint arXiv:2308.07526 (2023)."},{"key":"e_1_3_2_1_44_1","volume-title":"27th USENIX Security Symposium.","author":"Soltan Saleh","year":"2018","unstructured":"Saleh Soltan, Prateek Mittal, and H\u00a0Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2936474"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2569446"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3529299.3531488"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2020.3045667"},{"key":"e_1_3_2_1_50_1","volume-title":"When cyber got real: Challenges in securing cyber-physical systems. In 2018 IEEE SENSORS","author":"Zanero Stefano","unstructured":"Stefano Zanero. 2018. When cyber got real: Challenges in securing cyber-physical systems. In 2018 IEEE SENSORS. IEEE, 1\u20134."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568136"},{"key":"e_1_3_2_1_52_1","volume-title":"ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. arXiv preprint arXiv:2305.08037","author":"Zhou Ce","year":"2023","unstructured":"Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, and Alireza\u00a0Safdari Ghanhdari. 2023. ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. arXiv preprint arXiv:2305.08037 (2023)."}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC '23"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:38:40Z","timestamp":1755884320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":52,"alternative-id":["10.1145\/3627106.3627127","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627127","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}