{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:36:15Z","timestamp":1774449375143,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-22-1-2671,N00014-18-1-2674"],"award-info":[{"award-number":["N00014-22-1-2671,N00014-18-1-2674"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2144645"],"award-info":[{"award-number":["CNS-2144645"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690267","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1894-1908","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ERACAN: Defending Against an Emerging CAN Threat Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1196-5041","authenticated-orcid":false,"given":"Zhaozhou","family":"Tang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8637-7703","authenticated-orcid":false,"given":"Khaled","family":"Serag","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7302-0178","authenticated-orcid":false,"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7362-8905","authenticated-orcid":false,"given":"Z. Berkay","family":"Celik","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9892-8733","authenticated-orcid":false,"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9188-3464","authenticated-orcid":false,"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2023.23033"},{"key":"e_1_3_2_1_2_1","unstructured":"Khaled Serag Alsharif. 2023. PROACTIVE VULNERABILITY IDENTIFICATION AND DEFENSE CONSTRUCTION -- THE CASE FOR CAN. (2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"AMD. 2024. XA Automotive Product Selection Guide. https:\/\/docs.amd.com\/v\/u\/en-US\/xa-portfolio-product-selection-guide."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23013"},{"key":"e_1_3_2_1_5_1","unstructured":"Benjamin Blase. 2015. tdc-fpga: Time to digital converter for use on a Xilinx 7-series FPGA. https:\/\/github.com\/benbr8\/tdc-fpga."},{"key":"e_1_3_2_1_6_1","unstructured":"Tim Brom. 2018. CANT. https:\/\/github.com\/bitbane\/CANT."},{"key":"e_1_3_2_1_7_1","volume-title":"Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems. In Symposium on Vehicles Security and Privacy (VehicleSec).","author":"Cerracchio Paolo","year":"2024","unstructured":"Paolo Cerracchio, Stefano Longari, Michele Carminati, and Stefano Zanero. 2024. Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems. In Symposium on Vehicles Security and Privacy (VehicleSec)."},{"key":"e_1_3_2_1_8_1","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium.","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium."},{"key":"e_1_3_2_1_9_1","volume-title":"Error Handling of In-vehicle Networks Makes Them Vulnerable. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Cho Kyong-Tak","unstructured":"Kyong-Tak Cho and Kang G. Shin. 2016. Error Handling of In-vehicle Networks Makes Them Vulnerable. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_10_1","volume-title":"Viden: Attacker Identification on In-Vehicle Networks. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Cho Kyong-Tak","unstructured":"Kyong-Tak Cho and Kang G. Shin. 2017. Viden: Attacker Identification on In-Vehicle Networks. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium.","author":"Cho Kyong-Tak","unstructured":"Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","volume-title":"Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee.","author":"Choi Wonsuk","year":"2018","unstructured":"Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2018. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. IEEE Transactions on Vehicular Technology (2018)."},{"key":"e_1_3_2_1_13_1","volume-title":"Moon Chan Park, and Dong Hoon Lee.","author":"Choi Wonsuk","year":"2018","unstructured":"Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, and Dong Hoon Lee. 2018. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560618"},{"key":"e_1_3_2_1_15_1","first-page":"467","article-title":"System and method of monitoring data traffic on a MIL-STD-1553 data bus","volume":"10","author":"Eckhardt Josh D","year":"2019","unstructured":"Josh D Eckhardt, Thomas E Donofrio, and Khaled Serag. 2019. System and method of monitoring data traffic on a MIL-STD-1553 data bus. US Patent 10,467,174.","journal-title":"US Patent"},{"key":"e_1_3_2_1_16_1","first-page":"685","article-title":"Multiple security level monitor for monitoring a plurality of MIL-STD-1553 buses with multiple independent levels of security","volume":"10","author":"Eckhardt Josh D","year":"2020","unstructured":"Josh D Eckhardt, Thomas E Donofrio, and Khaled Serag. 2020. Multiple security level monitor for monitoring a plurality of MIL-STD-1553 buses with multiple independent levels of security. US Patent 10,685,125.","journal-title":"US Patent"},{"key":"e_1_3_2_1_17_1","volume-title":"International CAN Conference.","author":"Elend Bernd","year":"2017","unstructured":"Bernd Elend and Tony Adamson. 2017. Cyber security enhancing CAN transceivers. In International CAN Conference."},{"key":"e_1_3_2_1_18_1","unstructured":"International Organization for Standardization (ISO). 2016. Road Vehicles Controller area network (CAN). Part 2: Highspeed medium access unit."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"e_1_3_2_1_20_1","unstructured":"Robert Bosch GmbH. 1991. CAN Specification. (1991)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Bogdan Groza Lucian Popa and Pal-Stefan Murvay. 2018. INCANTA - INtrusion Detection in Controller Area Networks with Time-Covert Authentication. In Security and Safety Interplay of Intelligent Software Systems.","DOI":"10.1007\/978-3-030-16874-2_7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3017892"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium.","author":"Groza Bogdan","year":"2021","unstructured":"Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, and Asaf Shabtai. 2021. CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. In USENIX Security Symposium."},{"key":"e_1_3_2_1_25_1","volume-title":"Shin","author":"Han Kyusuk","year":"2015","unstructured":"Kyusuk Han, Andr\u00e9 Weimerskirch, and Kang G. Shin. 2015. A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier. In ESCAR Europe."},{"key":"e_1_3_2_1_26_1","unstructured":"Oliver Hartkopp and R Schilling. 2012. Message authenticated CAN (MaCAN). In ESCAR."},{"key":"e_1_3_2_1_27_1","unstructured":"Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In EASCAR."},{"key":"e_1_3_2_1_28_1","volume-title":"International CAN Conference.","author":"Hell Magnus-Maria","year":"2015","unstructured":"Magnus-Maria Hell. 2015. The physical layer in the CAN FD world-The update. In International CAN Conference."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_8"},{"key":"e_1_3_2_1_30_1","volume-title":"ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. In ACM ASIA Conference on Computer and Communications Security.","author":"Kim Sungwoo","year":"2022","unstructured":"Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan \"John\" Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, and Dave (Jing) Tian. 2022. ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. In ACM ASIA Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_32_1","volume-title":"EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. In Network and Distributed System Security Symposium (NDSS).","author":"Kneib Marcel","year":"2020","unstructured":"Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00122"},{"key":"e_1_3_2_1_35_1","unstructured":"Ryo Kurachi Yutaka Matsubara Hiroaki Takada Naoki Adachi Yukihiro Miyashita and Satoshi Horihata. 2014. CaCAN-centralized authentication system in CAN (controller area network). In ESCAR."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2930110"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357362"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34671-2_10"},{"key":"e_1_3_2_1_39_1","volume-title":"Adventures in automotive networks and control units. Def Con","author":"Chris Miller","year":"2013","unstructured":"Charlie. Miller and Chris. Valasek. 2013. Adventures in automotive networks and control units. Def Con (2013)."},{"key":"e_1_3_2_1_40_1","volume-title":"Remote exploitation of an unaltered passenger vehicle. Black Hat USA","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23047"},{"key":"e_1_3_2_1_42_1","unstructured":"Igor Mohor. 2017. CAN Protocol Controller. https:\/\/opencores.org\/projects\/can."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3103174"},{"key":"e_1_3_2_1_44_1","volume-title":"TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network","author":"Murvay Pal-Stefan","year":"2020","unstructured":"Pal-Stefan Murvay and Bogdan Groza. 2020. TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network. IEEE Access (2020)."},{"key":"e_1_3_2_1_45_1","volume-title":"Free-fall: Hacking tesla from wireless to can bus. Black Hat USA","author":"Nie Sen","year":"2017","unstructured":"Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-fall: Hacking tesla from wireless to can bus. Black Hat USA (2017)."},{"key":"e_1_3_2_1_46_1","volume-title":"Over-the-air: How we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. Black Hat USA","author":"Nie Sen","year":"2018","unstructured":"Sen Nie, Ling Liu, Yuefeng Du, and Wenkai Zhang. 2018. Over-the-air: How we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. Black Hat USA (2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437530"},{"key":"e_1_3_2_1_48_1","volume-title":"Link-Layer Denial-of-Service Attack Against Automotive Networks. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).","author":"Palanca Andrea","year":"2017","unstructured":"Andrea Palanca, Eric Evenchick, Federico Maggi, and Stefano Zanero. 2017. A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)."},{"key":"e_1_3_2_1_49_1","volume-title":"Annual Computer Security Applications Conference (ACSAC).","author":"Pes\u00e9 Mert D","unstructured":"Mert D Pes\u00e9, Jay W Schauer, Junhui Li, and Kang G. Shin. 2021. S2-CAN: Sufficiently Secure Controller Area Network. In Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"e_1_3_2_1_51_1","volume-title":"AN1798","author":"Robb Stuart","year":"1999","unstructured":"Stuart Robb and East Kilbride. 1999. CAN bit timing requirements. Motorola Semiconductor Application Note, AN1798 (1999)."},{"key":"e_1_3_2_1_52_1","volume-title":"EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. In Network and Distributed System Security Symposium (NDSS).","author":"Roeschlin Marc","year":"2023","unstructured":"Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, and Srdjan Capkun. 2023. EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_53_1","volume-title":"Detecting CAN Attacks on J1939 and NMEA 2000 Networks. IEEE Transactions on Dependable and Secure Computing","author":"Rogers Matthew","year":"2023","unstructured":"Matthew Rogers, Phillip Weigand, Jassim Happa, and Kasper Rasmussen. 2023. Detecting CAN Attacks on J1939 and NMEA 2000 Networks. IEEE Transactions on Dependable and Secure Computing (2023)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"e_1_3_2_1_55_1","volume-title":"SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. In ACM Asia Conference on Computer and Communications Security.","author":"Schell Oleg","year":"2023","unstructured":"Oleg Schell and Marcel Kneib. 2023. SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. In ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3217382"},{"key":"e_1_3_2_1_57_1","volume-title":"ZBCAN: A Zero-Byte CAN Defense System. In USENIX Security Symposium.","author":"Serag Khaled","year":"2023","unstructured":"Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, and Dongyan Xu. 2023. ZBCAN: A Zero-Byte CAN Defense System. In USENIX Security Symposium."},{"key":"e_1_3_2_1_58_1","volume-title":"Exposing New Vulnerabilities of Error Handling Mechanism in CAN. In USENIX Security Symposium.","author":"Serag Khaled","year":"2021","unstructured":"Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, and Dongyan Xu. 2021. Exposing New Vulnerabilities of Error Handling Mechanism in CAN. In USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23013"},{"key":"e_1_3_2_1_60_1","volume-title":"USENIX Security Symposium.","author":"Shin Jiwoo","year":"2023","unstructured":"Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo. 2023. RIDAS: Real-time identification of attack sources on controller area networks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"e_1_3_2_1_62_1","unstructured":"Ken Tindell. 2020. CAN Bus Security: Attacks on CAN bus and their mitigations. Technical Report. Canis Automotive Labs."},{"key":"e_1_3_2_1_63_1","unstructured":"Ken Tindell. 2020. CANHack. https:\/\/github.com\/kentindell\/canhack."},{"key":"e_1_3_2_1_64_1","unstructured":"Ken Tindell. 2020. Three new CAN protocol hacks. https:\/\/kentindell.github.io\/2020\/01\/20\/new-can-hacks\/."},{"key":"e_1_3_2_1_65_1","unstructured":"Ken Tindell. 2022. Running high speed signals through CAN bus wiring. https:\/\/kentindell.github.io\/2022\/11\/15\/canbus-wiring\/."},{"key":"e_1_3_2_1_66_1","volume-title":"ECRYPT Workshop on Lightweight Cryptography.","author":"Herrewege Anthony Van","year":"2011","unstructured":"Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography."},{"key":"e_1_3_2_1_67_1","unstructured":"Armin Wasicek Mert D Pes\u00e9 Andr\u00e9 Weimerskirch Yelizaveta Burakova and Karan Singh. 2017. Context-aware intrusion detection in automotive control systems. In ESCAR USA."},{"key":"e_1_3_2_1_68_1","volume-title":"USENIX Security Symposium.","author":"Wen Haohuang","year":"2020","unstructured":"Haohuang Wen, Qi Alfred Chen, and Zhiqiang Lin. 2020. Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. In USENIX Security Symposium."},{"key":"e_1_3_2_1_69_1","volume-title":"Workshop on Embedded Security in Cars.","author":"Wolf Marko","year":"2004","unstructured":"Marko Wolf, Andr\u00e9 Weimerskirch, and Christof Paar. 2004. Security in automotive bus systems. In Workshop on Embedded Security in Cars."},{"key":"e_1_3_2_1_70_1","volume-title":"CAN ID shuffling technique (CIST): Moving target defense strategy for protecting in-vehicle CAN","author":"Woo Samuel","year":"2019","unstructured":"Samuel Woo, Daesung Moon, Taek-Young Youn, Yousik Lee, and Yongeun Kim. 2019. CAN ID shuffling technique (CIST): Moving target defense strategy for protecting in-vehicle CAN. IEEE Access (2019)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3313783"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309179"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23024"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362034"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:22:10Z","timestamp":1755843730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":74,"alternative-id":["10.1145\/3658644.3690267","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690267","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}