{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:23:45Z","timestamp":1761805425855,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116406","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1634-1639","source":"Crossref","is-referenced-by-count":16,"title":["A Preliminary View on Automotive Cyber Security Management Systems"],"prefix":"10.23919","author":[{"given":"Christoph","family":"Schmittner","sequence":"first","affiliation":[]},{"given":"Jrgen","family":"Dobaj","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Macher","sequence":"additional","affiliation":[]},{"given":"Eugen","family":"Brenner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"International Organization for Standardization Geneva Switzerland","article-title":"Information technology security techniques information security management systems requirements","year":"2013","key":"ref39"},{"article-title":"Tisax assessment for information security in the automotive industry","year":"2019","author":"goia","key":"ref38"},{"key":"ref33","article-title":"Status of work in process on iso\/sae 21434 automotive cybersecurity standard","volume":"10","author":"barber","year":"2018","journal-title":"presentation ISO SAE International"},{"key":"ref32","article-title":"Guidelines on hardwarerooted security in mobile devices","author":"chen","year":"2012","journal-title":"Tech rep National Institute of Standards and Technology"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref30","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"Workshop on Embedded Security in Cars"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.888386"},{"key":"ref36","article-title":"Recommendation for key management, part 2: Best practices for key management organizations (2nd draft)","author":"barker","year":"2018","journal-title":"Tech rep National Institute of Standards and Technology"},{"journal-title":"International Electrotechnical Commission","article-title":"Iec 62443 - security for industrial automation and control systems","year":"2018","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97925-0_43"},{"article-title":"A multi-layer vehicle security framework","year":"2016","author":"birnie","key":"ref28"},{"year":"2010","key":"ref27","article-title":"Defense in depth.pdf"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"article-title":"A European strategy on Cooperative Intelligent Transport Systems, a milestone towards cooperative, connected and automated mobility","year":"2016","author":"commission","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10557-4_31"},{"article-title":"Deliverable d2.3: Security requirements for automotive on-board networks based on dark-side scenarios","year":"2009","author":"ruddle","key":"ref22"},{"year":"2012","key":"ref21","article-title":"Common Methodology for Information Technology Security Evaluation - Evaluation methodology"},{"key":"ref24","article-title":"Deliverable d2-security models","volume":"2","author":"islam","year":"2014","journal-title":"HEAVENS Project Deliverable D2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994499"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.06.033"},{"key":"ref25","article-title":"Tool-chain enriched security development in automotive industry","author":"vogt","year":"2019","journal-title":"Presentation at the 12th Graz Symposium Virtual Vehicle (GSVF)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97925-0_28"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28005-5_24"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-13255-2_118"},{"year":"0","key":"ref10","article-title":"Draft recommendation on cyber security of the task force on cyber security and over-the-air issues of unece wp.29 grva"},{"year":"0","key":"ref11","article-title":"DGRVA-01-xx (UN-CS_OTA) Final Draft Recommendation on Software Updates incl. Annex A-B"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66284-8_23"},{"journal-title":"International Organization for Standardization ISO","article-title":"ISO 26262 Road vehicles - Functional safety","year":"2018","key":"ref12"},{"journal-title":"SAE International Society of Automotive Engineers","article-title":"Sae j3061-cybersecurity guidebook for cyber-physical automotive systems","year":"2016","key":"ref13"},{"journal-title":"International Organization for Standardization Geneva Switzerland","article-title":"Risk management&#x2013;principles and guidelines","year":"2009","key":"ref14"},{"key":"ref15","first-page":"37","article-title":"Risk management framework for information systems and organizations","volume":"800","author":"force","year":"2018","journal-title":"NIST Special Publication"},{"key":"ref16","first-page":"1","article-title":"Adapting threat modeling methods for the automotive industry","author":"karahasanovic","year":"2017","journal-title":"Proceedings of the 15th ESCAR Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2016.139.68"},{"article-title":"Combining safety and security threat modeling to improve automotive penetration testing","year":"2019","author":"wolf","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0622"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387687"},{"year":"2019","key":"ref3","article-title":"Safety First for Automated Driving"},{"key":"ref6","article-title":"Remote Exploitation of an Unaltered Passenger Vehicle","author":"miller","year":"2015","journal-title":"tech rep Black Hat 2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2015.7396919"},{"year":"0","key":"ref8","article-title":"Task force on Cyber Security and (OTA) software updates (CS\/OTA)"},{"year":"0","key":"ref7","article-title":"World forum for harmonization of vehicle regulations"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-115"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3406021"},{"article-title":"Access to in-vehicle data and resources","year":"2017","author":"mccarthy","key":"ref46"},{"year":"0","key":"ref45","article-title":"Safe and secure access to vehicle data"},{"key":"ref48","first-page":"6","article-title":"The goal structuring notation&#x2013;a safety argument notation","author":"kelly","year":"2004","journal-title":"Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases"},{"year":"2019","key":"ref47","article-title":"Systems and software engineering systems and software assurance part 1: Concepts and vocabulary"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-150"},{"year":"0","key":"ref41","article-title":"Automotive information sharing and analysis center"},{"key":"ref44","first-page":"99","article-title":"An in-depth analysis of the security of the connected repair shop","author":"kleberger","year":"2012","journal-title":"The Seventh International Conference on Systems and Networks Communications (ICSNC) Proceedings Lisbon 18-23 November 2012 IARIA"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203278"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116406.pdf?arnumber=9116406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:43:12Z","timestamp":1594680192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":52,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116406","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}