{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:02Z","timestamp":1755974402016,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,5]]},"DOI":"10.1145\/3631204.3631865","type":"proceedings-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T12:05:32Z","timestamp":1701691532000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Computing an Automotive Cybersecurity Maturity Level Assessment Programme"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8647-7629","authenticated-orcid":false,"given":"Patrick","family":"Gr\u00fcmer","sequence":"first","affiliation":[{"name":"Faculty of Sciences, University of Porto, PT"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4681-7652","authenticated-orcid":false,"given":"Pedro","family":"Brand\u00e3o","sequence":"additional","affiliation":[{"name":"Faculty of Sciences, University of Porto, PT"}]}],"member":"320","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176340"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4377737"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40534-016-0117-3"},{"key":"e_1_3_2_1_4_1","volume-title":"Embedded World Conference","author":"Bergler Matthias","year":"2022","unstructured":"Matthias Bergler, Ramin\u00a0Tavakoli Kolagari, and Juha-Pekka Tolvanen. 2022. Integrating Security and Safety with Systems Engineering: a Model-Based Approach. In Embedded World Conference 2022. https:\/\/www.diva-portal.org\/smash\/get\/diva2:1755764\/FULLTEXT01.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8658720"},{"key":"e_1_3_2_1_6_1","unstructured":"Ramaswamy Chandramouli Tim Grance Rick Kuhn and Susan Landau. 2006. Common Vulnerability Scoring System. Technical Report. National Infrastructure Assurance Council. https:\/\/www.first.org\/cvss\/v2\/ieee_cvss_12_06.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.008"},{"key":"e_1_3_2_1_8_1","unstructured":"CVSS Special Interest Group (SIG) members. 2019. Common Vulnerability Scoring System version 3.1 Specification Document Revision 1. Technical Report. Forum of Incident Response and Security Teams or FIRST. https:\/\/www.first.org\/cvss\/v3.1\/specification-document"},{"key":"e_1_3_2_1_9_1","unstructured":"CVSS Special Interest Group (SIG) members. 2023. Common Vulnerability Scoring System version 4.0 Draft Specification Document. Technical Report. Forum of Incident Response and Security Teams or FIRST. https:\/\/www.first.org\/cvss\/v4-0\/cvss-v40-specification.pdf"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2018.00009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00070"},{"key":"e_1_3_2_1_13_1","unstructured":"Patrick Gr\u00fcmer. 2019. Attack Model Implementation for a Secure Onboard Communication from an Automotive ECU. https:\/\/repositorio-aberto.up.pt\/handle\/10216\/121626"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053441"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12110198"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.2987430"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.151"},{"key":"e_1_3_2_1_18_1","unstructured":"ISO. 2021. ISO 26262-3:2018 Road vehicles \u2014 Functional safety \u2014 Part 3: Concept phase. Technical Report. ISO. 5\u201312 pages. https:\/\/www.iso.org\/standard\/68385.html"},{"key":"e_1_3_2_1_19_1","unstructured":"ISO\/SAE DIS 21434. 2020. Road vehicles \u2014 cybersecurity engineering. Technical Report. International Organization for Standardization. 35\u201350 pages. https:\/\/www.iso.org\/standard\/70918.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Vipin\u00a0Kumar Kukkala Sooryaa\u00a0Vignesh Thiruloga and Sudeep Pasricha. 2022. Roadmap for Cybersecurity in Autonomous Vehicles. https:\/\/doi.org\/10.48550\/arXiv.2201.10349","DOI":"10.48550\/arXiv.2201.10349"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00020"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Patrick Gr\u00fcmer Pedro Brand\u00e3o. 2023. An Automotive Cybersecurity Maturity Level Assessment Programme. https:\/\/doi.org\/10.1109\/DSN-W58399.2023.00035","DOI":"10.1109\/DSN-W58399.2023.00035"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449775"},{"key":"e_1_3_2_1_25_1","unstructured":"SAE - Society of Automobile Engineers. 2021. SAE J3061 - Cybersecurity Guidebook for Cyber-Physical Vehicle Systems. https:\/\/www.sae.org\/standards\/content\/j3061_201601\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2019.8923077"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97925-0_43"},{"key":"e_1_3_2_1_28_1","unstructured":"Ozkan Serkan. 2022. Current CVSS Score Distribution For All Vulnerabilities. https:\/\/www.cvedetails.com\/cvss-score-distribution.php"},{"key":"e_1_3_2_1_29_1","unstructured":"David Silver. 2016. The Automotive Supply Chain Explained. https:\/\/medium.com\/self-driving-cars\/the-automotive-supply-chain-explained-d4e74250106f"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2758179"},{"key":"e_1_3_2_1_32_1","unstructured":"United Nations. 2021. UN Regulation No. 155. Technical Report. United Nations. https:\/\/unece.org\/sites\/default\/files\/2021-03\/R155e.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"United Nations. 2021. UN Regulation No. 156. Technical Report. United Nations. https:\/\/unece.org\/sites\/default\/files\/2021-03\/R156e.pdf"},{"key":"e_1_3_2_1_34_1","volume-title":"Upstream security global automotive cybersecurity report","author":"Security Upstream","year":"2019","unstructured":"Upstream Security. 2019. Upstream security global automotive cybersecurity report 2019. Technical Report. Upstream. https:\/\/upstream.auto\/upstream-security-global-automotive-cybersecurity-report-2019\/"},{"key":"e_1_3_2_1_35_1","volume-title":"Upstream security global automotive cybersecurity report","author":"Security Upstream","year":"2020","unstructured":"Upstream Security. 2020. Upstream security global automotive cybersecurity report 2020. Technical Report. Upstream. https:\/\/upstream.auto\/upstream-security-global-automotive-cybersecurity-report-2020\/"},{"key":"e_1_3_2_1_36_1","volume-title":"Upstream security global automotive cybersecurity report","author":"Security Upstream","year":"2021","unstructured":"Upstream Security. 2021. Upstream security global automotive cybersecurity report 2021. Technical Report. Upstream. https:\/\/upstream.auto\/2021report\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Upstream security global automotive cybersecurity report","author":"Security Upstream","year":"2022","unstructured":"Upstream Security. 2023. Upstream security global automotive cybersecurity report 2022. Technical Report. Upstream. https:\/\/upstream.auto\/reports\/global-automotive-cybersecurity-report\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19020334"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42154-021-00140-6"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00016"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104461"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2018.00035"},{"key":"e_1_3_2_1_43_1","first-page":"223","article-title":"Reaching Grey Havens Industrial Automotive Security Modeling with SAM","volume":"12","author":"Zoppelt Markus","year":"2019","unstructured":"Markus Zoppelt and Ramin\u00a0Tavakoli Kolagari. 2019. Reaching Grey Havens Industrial Automotive Security Modeling with SAM. International Journal On Advances in Security 12 (2019), 223\u2013235.","journal-title":"International Journal On Advances in Security"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32872-6"}],"event":{"name":"CSCS '23: Computer Science in Cars Symposium","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Darmstadt Germany","acronym":"CSCS '23"},"container-title":["Proceedings of the 7th ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631204.3631865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631204.3631865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:24:34Z","timestamp":1755973474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631204.3631865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"references-count":44,"alternative-id":["10.1145\/3631204.3631865","10.1145\/3631204"],"URL":"https:\/\/doi.org\/10.1145\/3631204.3631865","relation":{},"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"2023-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}