{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T13:05:55Z","timestamp":1769519155663,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733801.3774921","type":"proceedings-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:45:13Z","timestamp":1765439113000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Road Less Hacked: Enhancing Security in Automotive Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2025,12,10]]},"reference":[{"key":"e_1_3_3_1_2_2","volume-title":"Proceedings of the 33rd Network and Distributed System Security Symposium (NDSS)","author":"Cao Yingjie","year":"2026","unstructured":"Yingjie Cao, Xiaogang Zhu, Dean Sullivan, Haowei Yang, Lei Xue, Xian Li, Chenxiong Qian, Minrui Yan, and Xiapu Luo. 2026. IsolatOS: Detecting Double Fetch Bugs in COTS RTOS by Re-enabling Kernel Isolation. In Proceedings of the 33rd Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00080"},{"key":"e_1_3_3_1_4_2","first-page":"3237","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jing Pengfei","year":"2021","unstructured":"Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, and Shi Wu. 2021. Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations. In 30th USENIX Security Symposium (USENIX Security 21). 3237\u20133254."},{"key":"e_1_3_3_1_5_2","unstructured":"Yangyang Liu Lei Xue Sishan Wang Xiapu Luo Kaifa Zhao Pengfei Jing Xiaobo Ma Yajuan Tang and Haiying Zhou. 2025. Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation. IEEE Transactions on Intelligent Transportation Systems (2025)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Zhihao Wang Lei Xue Xiapu Luo Xiaobo Ma and Guofei Gu. 2025. Driving State-Aware Anomaly Detection for Autonomous Vehicles. IEEE Transactions on Information Forensics and Security (2025).","DOI":"10.1109\/TIFS.2025.3553370"},{"key":"e_1_3_3_1_7_2","first-page":"1921","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Xue Lei","year":"2022","unstructured":"Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, and Guofei Gu. 2022. { SAID} : State-aware defense against injection attacks on in-vehicle network. In 31st USENIX Security Symposium (USENIX Security 22). 1921\u20131938."},{"key":"e_1_3_3_1_8_2","first-page":"1939","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yu Le","year":"2022","unstructured":"Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, et\u00a0al. 2022. Towards automatically reverse engineering vehicle diagnostic protocols. In 31st USENIX Security Symposium (USENIX Security 22). 1939\u20131956."}],"event":{"name":"CPSIoTSec '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CPSIoTSec '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733801.3774921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:45:38Z","timestamp":1765439138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733801.3774921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":7,"alternative-id":["10.1145\/3733801.3774921","10.1145\/3733801"],"URL":"https:\/\/doi.org\/10.1145\/3733801.3774921","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}