{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:50:34Z","timestamp":1763344234246,"version":"3.45.0"},"reference-count":55,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063289","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T03:49:31Z","timestamp":1749095371000},"page":"2217-2243","source":"Crossref","is-referenced-by-count":0,"title":["Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path"],"prefix":"10.32604","volume":"84","author":[{"given":"Yu-Bin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Dong-Hyuk","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Ieck-Chae","family":"Euom","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"National Geographic. Electric cars may rule the world\u2019s roads by 2040 [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/www.nationalgeographic.com\/news\/2017\/09\/electriccars-replace-gasoline-engines-2040."},{"key":"ref2","unstructured":"Statista. Global public electric vehicle charging station market size between 2016 and 2022, with a forecast through 2028 [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/www.statista.com\/statistics\/1359545\/global-ev-charging-market-volume-forecast."},{"key":"ref3","unstructured":"MarketsandMarkets. [cited 2024 Dec 21]. Available from: https:\/\/www.marketsandmarkets.com."},{"journal-title":"Road vehicles\u2014vehicle to grid communication interface\u2014part 1: general information and use-case definition","year":"2013","key":"ref4"},{"journal-title":"Open charge point Protocol 1.6 (OCPP 1.6)","year":"2015","key":"ref5"},{"key":"ref6","series-title":"Proceedings of the 19th International Conference on Availability, Reliability and Security","article-title":"Attack analysis and detection for the combined electric vehicle charging and power grid domains","author":"Kern","year":"2024 Jul 30"},{"key":"ref7","unstructured":"Sarieddine K. Bolstering EV charging ecosystem infrastructure resilience and unraveling threats\u2014a comprehen-sive study [dissertation]. Montreal, QC, Canada: Concordia University; 2024."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"104379","DOI":"10.1016\/j.trd.2024.104379","article-title":"Data-driven vulnerability analysis of shared electric vehicle systems to cyberattacks","volume":"135","author":"Wang","year":"2024","journal-title":"Transp Res Part D Transp Environ"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"103337","DOI":"10.1016\/j.sysarc.2025.103337","article-title":"Electric vehicle charging network security: a survey","volume":"159","author":"Hu","year":"2025","journal-title":"J Syst Archit"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3565268","article-title":"EVScout2.0: electric vehicle profiling through charging profile","volume":"8","author":"Brighente","year":"2024","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"5833","DOI":"10.3390\/en17235833","article-title":"TestShark: a passive conformance testing system for ISO 15118 using wireshark","volume":"17","author":"Lee","year":"2024","journal-title":"Energies"},{"key":"ref12","unstructured":"Sagdullaev M. Fleet charging infrastructure resilience to cybersecurity threats [master\u2019s thesis]. Cincinnati, OH, USA: University of Cincinnati; 2024."},{"key":"ref13","series-title":"2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","article-title":"MaDEVIoT: cyberattacks on EV charging can disrupt power grid operation","author":"Acharya","year":"2024 Feb 19\u201322"},{"key":"ref14","series-title":"Proceedings of the Int\u2019l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications","first-page":"31","article-title":"Securing the electric vehicle charging infrastructure: an in-depth analysis of vulnerabilities and countermeasures","author":"Vailoces","year":"2023 Oct 30\u2013Nov 3"},{"key":"ref15","unstructured":"Szak\u00e1ly M, K\u00f6hler S, Martinovic I. Current affairs: a measurement study of deployment and security trends in EV charging infrastructure. arXiv:2404.06635. 2024. doi:10.48550\/arXiv.2404.06635."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/MNET.001.1900348","article-title":"A detailed security assessment of the EV charging ecosystem","volume":"34","author":"Antoun","year":"2020","journal-title":"IEEE Netw"},{"key":"ref17","series-title":"2024 4th International Conference on Sustainable Expert Systems (ICSES)","first-page":"127","article-title":"Communication protocols for electric vehicles: a comprehensive analysis","author":"Sultana","year":"2024 Oct 15\u201317"},{"key":"ref18","unstructured":"Idaho National Laboratory. EV SALaD 2023 demonstration best practices and mitigations for protecting EVSE infrastructure [Internet]; 2024. [cited 2024 Dec 21]. Available from: https:\/\/inldigitallibrary.inl.gov\/sites\/STI\/STI\/Sort_130145.pdf;."},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.2172\/1877784","author":"Johnson","year":"2022","journal-title":"Cybersecurity for electric vehicle charging infrastructure"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"6716","DOI":"10.3390\/s23156716","article-title":"Cybersecurity risk analysis of electric vehicles charging stations","volume":"23","author":"Hamdare","year":"2023","journal-title":"Sensors"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/TITS.2023.3307660","article-title":"Evaluation framework for electric vehicle security risk assessment","volume":"25","author":"Shirvani","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/SoutheastCon51012.2023.10115127","author":"Terrance","year":"2023 Apr 1\u201316","journal-title":"SoutheastCon 2023"},{"key":"ref23","volume":"31","author":"Elmo","year":"2023 Nov 27\u201330","journal-title":"2023 Resilience Week (RWS)"},{"key":"ref24","series-title":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","article-title":"Addressing security in OCPP: protection against man-in-the-middle attacks","author":"Rubio","year":"2018 Feb 26\u201328"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2452","DOI":"10.1109\/TSG.2017.2669647","article-title":"OCPP protocol: security threats and challenges","volume":"8","author":"Alcaraz","year":"2017","journal-title":"IEEE Trans Smart Grid"},{"key":"ref26","series-title":"2021 IEEE Transportation Electrification Conference & Expo (ITEC)","first-page":"573","article-title":"Cybersecurity for electric vehicle fast-charging infrastructure","author":"Sanghvi","year":"2021 Jun 21\u201325"},{"key":"ref27","series-title":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","first-page":"977","article-title":"Uncovering covert attacks on EV charging infrastructure: how OCPP backend vulnerabilities could compromise your system","author":"Sarieddine","year":"2024 Jul 1\u20135"},{"key":"ref28","series-title":"2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)","article-title":"Evil SteVe: an approach to simplify penetration testing of OCPP charge points","author":"Gebauer","year":"2022 Sep 6\u20139"},{"key":"ref29","series-title":"2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE)","article-title":"Analysis of EVCS switching attack impact on power grid operation","author":"Bonadonna","year":"2024 Oct 14\u201317"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"109735","DOI":"10.1016\/j.ijepes.2023.109735","article-title":"Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations","volume":"156","author":"Sarieddine","year":"2024","journal-title":"Int J Electr Power Energy Syst"},{"key":"ref31","series-title":"Proceedings of the SSTIC (Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications)","first-page":"5","article-title":"V2G injector: whispering to cars and charging units through the power-line","author":"Dudek","year":"2019 Jun 5\u20137"},{"key":"ref32","series-title":"European Symposium on Re-Search in Computer Security","first-page":"488","article-title":"Evexchange: a relay attack on electric vehicle charging system","author":"Conti","year":"2022 Sep 26"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"110281","DOI":"10.1016\/j.comnet.2024.110281","article-title":"TLS-handshake for plug and charge in vehicular communications","volume":"243","author":"Kilic","year":"2024","journal-title":"Comput Netw"},{"key":"ref34","first-page":"87","article-title":"Research on countermeasures against man-in-the-middle attacks through analysis and demonstration of V2G communication protocol security threats","volume":"24","author":"Kim","year":"2024","journal-title":"J Inf Secur"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00450-017-0342-y","article-title":"A threat analysis of the vehicle-to-grid charging protocol ISO 15118","volume":"33","author":"Bao","year":"2018","journal-title":"Comput Sci Res Dev"},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"K\u00f6hler S, Baker R, Strohmeier M, Martinovic I. Brokenwire: wireless disruption of CCS electric vehicle charging. 2022. doi:10.48550\/arXiv.2202.02104.","DOI":"10.14722\/ndss.2023.23251"},{"key":"ref37","series-title":"2014 International Conference on IT Convergence and Security (ICITCS)","article-title":"Study on analysis of security vulnerabilities and countermeasures in ISO\/IEC 15118 based electric vehicle charging technology","author":"Lee","year":"2014 Oct 28\u201330"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"3931","DOI":"10.3390\/en15113931","article-title":"Review of electric vehicle charger cybersecurity vulnerabilities, potential impacts, and defenses","volume":"15","author":"Johnson","year":"2022","journal-title":"Energies"},{"journal-title":"Electric vehicle conductive charging system\u2014part 1: general requirements","year":"2017","key":"ref39"},{"journal-title":"Road vehicles\u2014vehicle to grid communication interface\u2014part 2: network and application protocol requirements","year":"2014","key":"ref40"},{"journal-title":"Road vehicles\u2014vehicle to grid communication interface\u2014part 3: physical and data link layer requirements","year":"2015","key":"ref41"},{"key":"ref42","unstructured":"HomePlug Powerline Alliance. HomePlug Green PHY 1.1: the standard for in-house smart grid powerline communications: an application and technology overview [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/www.homeplug.org\/media\/filer_public\/98\/4e\/984e8b2e-5b8e-4f5a-8e5e-2b4e5e5e5e5e\/homeplug_gp_1_1_whitepaper.pdf."},{"journal-title":"Road vehicles\u2014vehicle to grid communication interface\u2014part 4: network and application protocol conformance test requirements","year":"2018","key":"ref43"},{"journal-title":"Road vehicles\u2014vehicle to grid communication interface\u2014part 5: physical layer and data link layer conformance test requirements","year":"2018","key":"ref44"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"121","DOI":"10.18280\/jesa.560116","article-title":"Ensuring compliance and reliability in EV charging station management systems: a novel testing tool for OCPP 1.6 messages conformance","volume":"56","author":"Priyasta","year":"2023","journal-title":"J Eur Des Syst\u00e8mes Autom"},{"key":"ref46","series-title":"Proceedings Symposium on Vehicle Security & Privacy","article-title":"OCPPStorm: a comprehensive fuzzing tool for OCPP implementations","author":"Coppoletta","year":"2024 Feb 26"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"165","DOI":"10.3390\/app6060165","article-title":"Building an interoperability test system for electric vehicle chargers based on ISO\/IEC 15118 and IEC 61850 standards","volume":"6","author":"Shin","year":"2016","journal-title":"Appl Sci"},{"key":"ref48","series-title":"2014 IEEE PES General Meeting | Conference & Exposition","article-title":"An ISO\/IEC 15118 conformance testing system architecture","author":"H\u00e4nsch","year":"2014 Jul 27\u201331"},{"key":"ref49","unstructured":"Schoneberger T. FUZZ testing the ISO 15118 protocol stack [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/cdn.vector.com\/cms\/content\/events\/2021\/vSES21\/vSES21_Slides07_Schoeneberger_Vector.pdf."},{"key":"ref50","series-title":"Proceedings of the 38th IEEE Symposium on Security and Privacy","article-title":"Poster: IoTcube: an automated analysis platform for finding security vulnerabilities","author":"Kim","year":"2017 May 22\u201324"},{"key":"ref51","series-title":"2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"343","article-title":"L2Fuzz: discovering bluetooth L2CAP vulnerabilities using stateful fuzz testing","author":"Park","year":"2022 Jun 27\u201330"},{"key":"ref52","unstructured":"Zalewski M. American fuzzy lop [Internet]. [cited 2024 Dec 21]. Available from: http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-031-70896-1_6","author":"Ahn","year":"2024","journal-title":"Computer security\u2014ESORICS 2024"},{"key":"ref54","unstructured":"GitHub. EVC-Fuzzer Project [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/github.com\/kingyoubin\/EVC-Fuzzer-project."},{"key":"ref55","unstructured":"GitHub. IdahoLabResearch\/AcCCS [Internet]. [cited 2024 Dec 21]. Available from: https:\/\/github.com\/IdahoLabResearch\/AcCCS."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_63289\/TSP_CMC_63289.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:47:33Z","timestamp":1763344053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":55,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063289","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}