{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T19:10:11Z","timestamp":1755976211080,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1586,19A23009F,19S23002E"],"award-info":[{"award-number":["16KIS1586,19A23009F,19S23002E"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689936.3694697","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T18:21:08Z","timestamp":1732126868000},"page":"25-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2707-2763","authenticated-orcid":false,"given":"Florian","family":"Fenzl","sequence":"first","affiliation":[{"name":"Fraunhofer SIT | ATHENE, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5658-0225","authenticated-orcid":false,"given":"Jonathan","family":"Stancke","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT | ATHENE, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7404-5349","authenticated-orcid":false,"given":"Christian","family":"Plappert","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT | ATHENE, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3461-0520","authenticated-orcid":false,"given":"Roland","family":"Rieke","sequence":"additional","affiliation":[{"name":"Independent researcher, Griesheim, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5735-0787","authenticated-orcid":false,"given":"Felix","family":"Gail","sequence":"additional","affiliation":[{"name":"Independent researcher, Trier, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9522-1863","authenticated-orcid":false,"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[{"name":"Huawei Technologies (Germany), Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5684-1689","authenticated-orcid":false,"given":"Hussein","family":"Joumaa","sequence":"additional","affiliation":[{"name":"Huawei Technologies (Germany), Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT52158.2021.9548425"},{"key":"e_1_3_2_1_3_1","unstructured":"AUTOSAR. 2020. Specification of Intrusion Detection System Manager. https:\/\/www.autosar.org\/fileadmin\/standards\/R20--11\/CP\/AUTOSAR_SWS_IntrusionDetectionSystemManager.pdf accessed 2024-05--28."},{"key":"e_1_3_2_1_4_1","unstructured":"AUTOSAR. 2022. Main Requirements. https:\/\/www.autosar.org\/fileadmin\/standards\/R22--11\/FO\/AUTOSAR_RS_Main.pdf accessed 2024-05--28."},{"key":"e_1_3_2_1_5_1","unstructured":"Evita Consortium. 2011. Evita Deliverable D3.2: Secure On-board Architecture Specification. https:\/\/evita-project.org\/Deliverables\/EVITAD3.2.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"ENISA. 2020. Cybersecurity Stocktaking in the CAM. Technical Report. ENISA. https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-stocktaking-in-the-cam Accessed 2024-05--28."},{"key":"e_1_3_2_1_7_1","unstructured":"Robert Escherich Ingo Ledendecker Carsten Schmal Burkhard Kuhls Christian Grothe and Frank Scharberth. 2009. SHE -- Secure Hardware Extension Functional Specification Version 1.1 Rev: 439."},{"key":"e_1_3_2_1_8_1","volume-title":"Marco De Vincenzi, and Ilaria Matteucci","author":"Fenzl Florian","year":"2023","unstructured":"Florian Fenzl, Christian Plappert, Roland Rieke, Daniel Zelle, Gianpiero Costantino, Marco De Vincenzi, and Ilaria Matteucci. 2023. Collaborative Security Patterns for Automotive Electrical\/Electronic Architectures. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 63--97."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--43430--3_12"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00096"},{"key":"e_1_3_2_1_12_1","volume-title":"SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 36--50","author":"Hariri Ali","year":"2021","unstructured":"Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, and Muttukrishnan Rajarajan. 2021. SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 36--50."},{"key":"e_1_3_2_1_13_1","unstructured":"Nadine Herold. 2017. Incident Handling Systems with Automated Intrusion Response. Ph. D. Dissertation. Technische Universit\u00e4t M\u00fcnchen. https:\/\/nbn-resolving.org\/urn:nbn:de:bvb:91-diss-20170515--1341280--1--4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Jenny Hofbauer Kevin Gomez and Hans-Joachim Hof. 2023. From SOC to VSOC: Transferring Key Requirements for Efficient Vehicle Security Operations. https:\/\/doi.org\/10.13154\/294--10389","DOI":"10.13154\/294--10389"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"e_1_3_2_1_16_1","unstructured":"Vincent C Hu David Ferraiolo Rick Kuhn Arthur R Friedman Alan J Lang Margaret M Cogdell Adam Schnitzer Kenneth Sandlin Robert Miller Karen Scarfone et al. 2013. Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication Vol. 800 162 (2013) 1--54."},{"key":"e_1_3_2_1_17_1","unstructured":"Numaan Huq Craig Gibson and Rainer Vosseler. 2020. Driving Security Into Connected Cars:Threat Model and Recommendations. Technical Report. Trend Micro Research. https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-driving-security-into-connected-cars.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"IFAG. 2023. SLI 9670. https:\/\/www.infineon.com\/cms\/en\/product\/security-smart-card-solutions\/optiga-embedded-security-solutions\/optiga-tpm\/sli-9670\/?redirId=68293 Accessed 2024-05--28."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-14-8593-0_4204-cd"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32287-7_7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9235101"},{"key":"e_1_3_2_1_22_1","unstructured":"OASIS. 2015. Abbreviated language for authorization Version 1.0. https:\/\/groups.oasis-open.org\/higherlogic\/ws\/public\/document?document_id=55228 Accessed 2024-05--28."},{"key":"e_1_3_2_1_23_1","unstructured":"OASIS. 2017. eXtensible Access Control Markup Language (XACML) Version 3.0 Plus Errata 01. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-en.html Accessed 2024-05--28."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437521"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103514"},{"key":"e_1_3_2_1_28_1","unstructured":"AuthzForce project. 2024. AuthzForce (Community Edition). https:\/\/authzforce.ow2.org\/. https:\/\/github.com\/authzforce\/restful-pdp accessed 2024-05--21."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"e_1_3_2_1_30_1","unstructured":"STMicroelectronics. 2023. ST33GTPMAI2C. https:\/\/www.st.com\/en\/secure-mcus\/st33gtpmai2c.html Accessed 2024-05--28."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145054"},{"key":"e_1_3_2_1_32_1","unstructured":"Trusted Computing Group. 2018. Hardware Requirements for a Device Identifier Composition Engine. https:\/\/trustedcomputinggroup.org\/resource\/hardware-requirements-for-a-device-identifier-composition-engine\/ Accessed 2024-05--28."},{"key":"e_1_3_2_1_33_1","unstructured":"Trusted Computing Group. 2019. TPM 2.0 Library Specification. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/. Accessed 2024-05--28."},{"key":"e_1_3_2_1_34_1","unstructured":"United Nations. 2021. UN Regulation No. 155: Uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system. https:\/\/unece.org\/sites\/default\/files\/2021-03\/R155e.pdf accessed 2024-05--28."},{"key":"e_1_3_2_1_35_1","volume-title":"ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide). arXiv preprint arXiv:2012.14600 (December","author":"Verma Miki E","year":"2020","unstructured":"Miki E Verma, Michael D Iannacone, Robert A Bridges, Samuel C Hollifield, Bill Kay, and Frank L Combs. 2020. ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide). arXiv preprint arXiv:2012.14600 (December 2020). https:\/\/arxiv.org\/pdf\/2012.14600.pdf"},{"key":"e_1_3_2_1_36_1","unstructured":"Ralf-Philipp Weinmann and Benedikt Schmotzle. 2020. TBONE -- A zero-click exploit for Tesla MCUs. Technical Report. Comsecuris UG. https:\/\/kunnamon.io\/tbone\/tbone-v1.0-redacted.pdf"},{"key":"e_1_3_2_1_37_1","volume-title":"A systematic mapping study on security countermeasures of in-vehicle communication systems. arXiv preprint arXiv:2105.00183","author":"Yu Jinghua","year":"2021","unstructured":"Jinghua Yu, Stefan Wagner, Bowen Wang, and Feng Luo. 2021. A systematic mapping study on security countermeasures of in-vehicle communication systems. arXiv preprint arXiv:2105.00183 (2021)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465748"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104461"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 Cyber Security in CarS Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689936.3694697","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689936.3694697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:35:36Z","timestamp":1755974136000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689936.3694697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":39,"alternative-id":["10.1145\/3689936.3694697","10.1145\/3689936"],"URL":"https:\/\/doi.org\/10.1145\/3689936.3694697","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}