{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:05:08Z","timestamp":1747973108696,"version":"3.41.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.23919\/date64628.2025.10993252","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:36:35Z","timestamp":1747848995000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["SACK: Enabling Environmental Situation-Aware Access Control for Vehicles in Linux Kernel"],"prefix":"10.23919","author":[{"given":"Boyan","family":"Chen","sequence":"first","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]},{"given":"Lei","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University"}]},{"given":"Jiarui","family":"She","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]},{"given":"Xiaolei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University,Department of Computing"}]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]},{"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronic, Peking University"}]}],"member":"263","reference":[{"volume-title":"Apparmor","year":"2024","key":"ref1"},{"volume-title":"Cve-2023\u20136073","year":"2024","key":"ref2"},{"volume-title":"Safe-driving","year":"2023","key":"ref3"},{"volume-title":"Visionfive2","year":"2024","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398923"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136910"},{"key":"ref7","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on android for diverse security and privacy policies","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Bugiel","year":"2013"},{"key":"ref8","first-page":"803","article-title":"A large scale study of user behavior, expectations and engagement with android permissions","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Cao","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204249"},{"volume-title":"securityfs","year":"2024","key":"ref10"},{"key":"ref11","article-title":"Koffee-kia offensive exploit","author":"Costantino","year":"2020","journal-title":"Istituto di Informatica e Telematica, Tech. Rep."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24368"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"ref14","first-page":"88","article-title":"Permission re-delegation: Attacks and defenses","volume-title":"USENIX security symposium","volume":"30","author":"Felt","year":"2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737510"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2016.24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3097146"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022759"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00035"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583650"},{"issue":"2","key":"ref22","first-page":"2","article-title":"Contexlot: Towards providing contextual integrity to appified iot platforms","volume":"2","author":"Jia","year":"2017","journal-title":"ndss"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179475"},{"key":"ref24","first-page":"279","article-title":"lmbench: Portable tools for performance analysis","volume-title":"USENIX annual technical conference","author":"McVoy","year":"1996"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"issue":"1","key":"ref26","first-page":"16","article-title":"Free-fall: Hacking tesla from wireless to can bus","volume":"25","author":"Nie","year":"2017","journal-title":"Briefing, Black Hat USA"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"issue":"23\u20130123","key":"ref28","article-title":"Field assessment of gm\/onstar occupant-based injury severity prediction","volume-title":"27th International Technical Conference on the Enhanced Safety of Vehicles (ESV) National Highway Traffic Safety Administration","author":"Owen","year":"2023"},{"key":"ref29","first-page":"3613","article-title":"SEApp: Bringing mandatory access control to android apps","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Rossi","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320731"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3299429"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3527293"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4271\/9781468600810"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/fits.2003.1264934"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43904-9_3"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72117-5_56"},{"article-title":"Mh-pflid: Model heterogeneous personalized federated learning via injection and distillation for medical data analysis","volume-title":"Forty-first International Conference on Machine Learning","author":"Xie","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450007"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2300482"},{"key":"ref43","first-page":"1133","article-title":"Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Zhou","year":"2019"}],"event":{"name":"2025 Design, Automation &amp; Test in Europe Conference (DATE)","start":{"date-parts":[[2025,3,31]]},"location":"Lyon, France","end":{"date-parts":[[2025,4,2]]}},"container-title":["2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992638\/10992588\/10993252.pdf?arnumber=10993252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:39:32Z","timestamp":1747892372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10993252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":43,"URL":"https:\/\/doi.org\/10.23919\/date64628.2025.10993252","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}