{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:08:13Z","timestamp":1729645693496,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/dsnw.2013.6615528","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T18:32:25Z","timestamp":1380738745000},"page":"1-12","source":"Crossref","is-referenced-by-count":122,"title":["Survey on security threats and protection mechanisms in embedded automotive networks"],"prefix":"10.1109","author":[{"given":"Ivan","family":"Studnia","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Nicomette","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Alata","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Kaaniche","sequence":"additional","affiliation":[]},{"given":"Youssef","family":"Laarouchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-121"},{"year":"2011","key":"35"},{"journal-title":"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars","year":"2010","author":"francillon","key":"17"},{"key":"18","article-title":"Security aspects of the in-vehicle network in the connected car","author":"kjeberger","year":"2011","journal-title":"Intelligent Vehicles Symposium"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940552"},{"key":"15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-71039-4_6","article-title":"Algebraic and slide attacks on keeloq","author":"courtois","year":"2008","journal-title":"Fast Software Encryption"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"16","first-page":"203","article-title":"On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme","author":"eisenbarth","year":"2008","journal-title":"Advances in Cryptology"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2012.6463997"},{"key":"14","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"rouf","year":"2010","journal-title":"Proc Usenix Security Symposium"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"12","first-page":"66","article-title":"Simulated attacks on can buses: Vehicle virus","author":"nilsson","year":"2008","journal-title":"Proc 5th LASTED Int Conf on Communication Systems and Networks"},{"year":"0","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"22","article-title":"Securing vehicular on-board it systems: The evita project","author":"henniger","year":"2009","journal-title":"25th v DIIVW Automotive Security Conf"},{"key":"23","article-title":"Oversee a secure and open communication and runtime platform for innovative automotive applications","author":"groll","year":"2009","journal-title":"6th Emb Security in Cars Conf (escar)"},{"key":"24","article-title":"Canauth-A simple, backward compatible broadcast authentication protocol for can bus","author":"van herrewege","year":"2011","journal-title":"Embedded Security in Cars Conf"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"},{"key":"26","article-title":"Macan-message authenticated can","author":"hartkopp","year":"2012","journal-title":"10th Int Conf on Embedded Security in Cars (ESCAR 2012)"},{"key":"27","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-642-31912-9_20","article-title":"Design, implementation, and evaluation of a vehicular hardware security module","author":"wolf","year":"2012","journal-title":"Information Security and Cryptology - ICISC 2011"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2003.1253288"},{"key":"3","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 10th USENIX Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763169"},{"key":"10","article-title":"Sniffing\/replay attacks on can buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy","author":"hoppe","year":"2007","journal-title":"2nd Workshop on Embedded Systems Security (WESS)"},{"key":"1","first-page":"3","article-title":"This car runs on code","volume":"46","author":"charette","year":"2009","journal-title":"IEEE Spectr"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240294"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.260"},{"journal-title":"A Common Langnage for Computer Security Incidents","year":"1995","author":"howard","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/74706"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/VCSC.2012.6281235"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.932539"},{"key":"9","article-title":"Automotive itsecurity as a challenge: Basic attacks from the black box perspective on the example of privacy threats","author":"hoppe","year":"2009","journal-title":"Computer Safety Reliability and Security"},{"key":"8","first-page":"11","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"2nd Embedded Security in Cars Workshop (ESCAR 2004)"}],"event":{"name":"2013 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","start":{"date-parts":[[2013,6,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,27]]}},"container-title":["2013 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597028\/6615495\/06615528.pdf?arnumber=6615528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T19:02:20Z","timestamp":1498071740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6615528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dsnw.2013.6615528","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}