{"id":"https://openalex.org/W2050599407","doi":"https://doi.org/10.1145/1582379.1582474","title":"Hardware architecture for trustable vehicular electronic control units","display_name":"Hardware architecture for trustable vehicular electronic control units","publication_year":2009,"publication_date":"2009-06-21","ids":{"openalex":"https://openalex.org/W2050599407","doi":"https://doi.org/10.1145/1582379.1582474","mag":"2050599407"},"language":"en","primary_location":{"id":"doi:10.1145/1582379.1582474","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1582379.1582474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112355190","display_name":"Wael Adi","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Wael Adi","raw_affiliation_strings":["Technical University of Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086751237","display_name":"N. Kassab","orcid":null},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Nizar Kassab","raw_affiliation_strings":["Ajman University of Science &amp; Technology, Ajman, UAE"],"affiliations":[{"raw_affiliation_string":"Ajman University of Science &amp; Technology, Ajman, UAE","institution_ids":["https://openalex.org/I182000528"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112355190"],"corresponding_institution_ids":["https://openalex.org/I94509681"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09442526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"437","last_page":"441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6152738928794861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5906168818473816},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5739386677742004},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.554065465927124},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5367843508720398},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.4705154001712799},{"id":"https://openalex.org/keywords/license","display_name":"License","score":0.4693855941295624},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.43396133184432983},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.43009477853775024},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4157552421092987},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38751286268234253},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3568836450576782},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22587519884109497},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15287187695503235}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6152738928794861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5906168818473816},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5739386677742004},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.554065465927124},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5367843508720398},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.4705154001712799},{"id":"https://openalex.org/C2780560020","wikidata":"https://www.wikidata.org/wiki/Q79719","display_name":"License","level":2,"score":0.4693855941295624},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.43396133184432983},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.43009477853775024},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4157552421092987},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38751286268234253},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3568836450576782},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22587519884109497},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15287187695503235},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1582379.1582474","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1582379.1582474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2026505102","https://openalex.org/W2069124975","https://openalex.org/W2093833539","https://openalex.org/W2101137140","https://openalex.org/W2107217398","https://openalex.org/W2146226751","https://openalex.org/W2148340002","https://openalex.org/W2149558602","https://openalex.org/W2159584786","https://openalex.org/W2172255798"],"related_works":["https://openalex.org/W3191226418","https://openalex.org/W2357749344","https://openalex.org/W4323356230","https://openalex.org/W2362200800","https://openalex.org/W1539823648","https://openalex.org/W4290078996","https://openalex.org/W3113783116","https://openalex.org/W4372352523","https://openalex.org/W3211012000","https://openalex.org/W3208645214"],"abstract_inverted_index":{"Most":[0],"popular":[1],"attacks":[2],"on":[3],"vehicular":[4,57,68,189],"systems":[5],"involve":[6],"replacing":[7],"legal":[8],"by":[9],"fake":[10],"physical":[11,78,178],"unit":[12,81],"or":[13],"manipulating":[14],"existing":[15],"system":[16,158,191],"elements.":[17],"Cars":[18],"incorporate":[19],"many":[20,104],"functional":[21],"units":[22],"such":[23,90,130],"as":[24,160,192],"the":[25,42,66,87,161,168,183,206,210],"odometer":[26],"and":[27,36,80,93,115,167,196,201],"maintenance":[28],"counters,":[29],"which":[30],"have":[31],"to":[32,38,117],"be":[33,99,145],"uniquely":[34],"identified":[35,147],"supposed":[37],"stay":[39],"manipulation-free":[40],"for":[41,56,148,157,185],"virtual":[43],"vehicle":[44],"lifetime":[45],"of":[46,171,209],"about":[47],"15":[48],"years.":[49],"A":[50,76,198],"novel":[51],"clone-resisting":[52],"technology":[53],"is":[54,63,113,124,155,204],"proposed":[55],"environment.":[58],"The":[59,122],"particular":[60],"resulting":[61],"property":[62],"that":[64,91,131],"even":[65,132],"participating":[67],"manufacturers":[69],"can":[70,98,181],"hardly":[71],"clone":[72],"own":[73],"fabricated":[74],"units.":[75],"new":[77,110],"architecture":[79],"personalization":[82],"process":[83,129],"are":[84,164],"implemented":[85],"in":[86,126,150,194],"production":[88,95,102],"scenario":[89],"fair":[92],"controllable":[94],"license":[96],"agreements":[97],"enforced.":[100],"Vehicular":[101],"includes":[103],"sub-contractors":[105],"manufacturing":[106],"sub-units":[107],"therefore":[108],"a":[109,118,127,134,172,186],"multi-identity":[111],"certification":[112],"embedded":[114],"linked":[116],"scalable":[119],"authentication":[120],"protocol.":[121],"identity":[123],"kept":[125],"living/dynamic":[128],"if":[133],"cloning":[135],"attack":[136,174],"was":[137],"successful":[138,173],"at":[139],"some":[140],"time":[141],"point,":[142],"it":[143],"would":[144],"soon":[146],"sure":[149],"later":[151],"transactions.":[152],"This":[153],"fact":[154],"frustrating":[156],"attackers":[159],"attack's":[162],"costs":[163],"too":[165],"high":[166],"use":[169],"out":[170],"becomes":[175],"negligible.":[176],"Authentic":[177],"hardware":[179],"anchor":[180],"build":[182],"basis":[184],"trustable":[187],"secured":[188],"communication":[190],"indicated":[193],"[10]":[195],"[11].":[197],"short":[199],"risk":[200],"threat":[202],"analysis":[203],"demonstrating":[205],"security":[207],"stability":[208],"system.":[211]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
