A systematic survey of attack detection and prevention in connected and autonomous vehicles

T Limbasiya, KZ Teng, S Chattopadhyay… - Vehicular …, 2022 - Elsevier
The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in various
smart transportation services and applications, considering many benefits to society, people …

A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency

Y Man, R Muller, M Li, ZB Celik, R Gerdes - 32nd USENIX Security …, 2023 - usenix.org
Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the
environment and predict the trajectory of surrounding objects for planning purposes. An …

Side channel analysis: A novel intrusion detection system based on vehicle voltage signals

Y Xun, Z Deng, J Liu, Y Zhao - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Intelligent connected vehicles (ICVs) integrate advanced equipment and communication
network technologies to realize information exchange and sharing between vehicles and …

IdentifierIDS: A practical voltage-based intrusion detection system for real in-vehicle networks

Z Deng, J Liu, Y Xun, J Qin - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
As innovative technologies such as autonomous driving, over-the-air technology, and
vehicle-to-everything are widely applied to intelligent connected vehicles, people can gain a …

DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering

P Cheng, M Han, G Liu - Future Generation Computer Systems, 2023 - Elsevier
Controller area network (CAN) is a widely used communication protocol for in-vehicle
networks. With the up-gradation of traditional vehicle ad-hoc networks (VANETs) to the …

[PDF][PDF] Evading Voltage-Based Intrusion Detection on Automotive CAN.

R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu - NDSS, 2021 - friends.cs.purdue.edu
The controller area network (CAN) is widely adopted in modern automobiles to enable
communications among in-vehicle electronic control units (ECUs). Lacking mainstream …

Ecuprint—physical fingerprinting electronic control units on can buses inside cars and sae j1939 compliant vehicles

L Popa, B Groza, C Jichici… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We fingerprint 54 ECUs from 10 cars, one of them being a heavy-duty vehicle that is
compliant to the SAE J1939 standard. These later specifications implemented in commercial …

[PDF][PDF] EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.

M Kneib, O Schell, C Huth - NDSS, 2020 - pdfs.semanticscholar.org
EASI: Edge-Based Sender Identification on Resource- Constrained Platforms for Automotive
Networks Page 1 EASI: Edge-Based Sender Identification on ResourceConstrained Platforms …

[HTML][HTML] {ZBCAN}: A {Zero-Byte}{CAN} Defense System

K Serag, R Bhatia, A Faqih, MO Ozmen… - 32nd USENIX Security …, 2023 - usenix.org
In larger organisations, the security controls and policies that protect employees are typically
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …