{"id":"https://openalex.org/W2966932748","doi":"https://doi.org/10.1145/3339252.3340329","title":"Applying Security Testing Techniques to Automotive Engineering","display_name":"Applying Security Testing Techniques to Automotive Engineering","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2966932748","doi":"https://doi.org/10.1145/3339252.3340329","mag":"2966932748"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340329","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2309.09647","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029056103","display_name":"Irdin Pekaric","orcid":"https://orcid.org/0000-0002-0706-3202"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Irdin Pekaric","raw_affiliation_strings":["Department of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039557173","display_name":"Clemens Sauerwein","orcid":"https://orcid.org/0009-0009-9464-5080"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Clemens Sauerwein","raw_affiliation_strings":["Department of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055476405","display_name":"Michael Felderer","orcid":"https://orcid.org/0000-0003-3818-4442"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Felderer","raw_affiliation_strings":["Department of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029056103"],"corresponding_institution_ids":["https://openalex.org/I190249584"],"apc_list":null,"apc_paid":null,"fwci":1.3265,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.81258672,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autosar","display_name":"AUTOSAR","score":0.8632357120513916},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.6306917667388916},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.6196566820144653},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5560342073440552},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4813724160194397},{"id":"https://openalex.org/keywords/regression-testing","display_name":"Regression testing","score":0.46152442693710327},{"id":"https://openalex.org/keywords/test-strategy","display_name":"Test strategy","score":0.44453510642051697},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.43591535091400146},{"id":"https://openalex.org/keywords/development-testing","display_name":"Development testing","score":0.4228816628456116},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3904288709163666},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3769252300262451},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3400730490684509},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.326321542263031},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3114403784275055},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.27831122279167175},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.19817626476287842},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.19657045602798462},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.19122529029846191},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.18314135074615479},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17959192395210266},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.10626143217086792},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.090426504611969}],"concepts":[{"id":"https://openalex.org/C2778602020","wikidata":"https://www.wikidata.org/wiki/Q300113","display_name":"AUTOSAR","level":3,"score":0.8632357120513916},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.6306917667388916},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.6196566820144653},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5560342073440552},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4813724160194397},{"id":"https://openalex.org/C161821725","wikidata":"https://www.wikidata.org/wiki/Q917415","display_name":"Regression testing","level":5,"score":0.46152442693710327},{"id":"https://openalex.org/C188598960","wikidata":"https://www.wikidata.org/wiki/Q7705805","display_name":"Test strategy","level":3,"score":0.44453510642051697},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.43591535091400146},{"id":"https://openalex.org/C63406617","wikidata":"https://www.wikidata.org/wiki/Q5266714","display_name":"Development testing","level":5,"score":0.4228816628456116},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3904288709163666},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3769252300262451},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3400730490684509},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.326321542263031},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3114403784275055},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.27831122279167175},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.19817626476287842},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.19657045602798462},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.19122529029846191},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.18314135074615479},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17959192395210266},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.10626143217086792},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.090426504611969},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3339252.3340329","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2309.09647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.09647","pdf_url":"https://arxiv.org/pdf/2309.09647","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2309.09647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.09647","pdf_url":"https://arxiv.org/pdf/2309.09647","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.5099999904632568}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323033","display_name":"Bundesministerium f\u00fcr Verkehr, Innovation und Technologie","ror":"https://ror.org/04marky29"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2966932748.pdf","grobid_xml":"https://content.openalex.org/works/W2966932748.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W185142374","https://openalex.org/W1927364623","https://openalex.org/W1969222329","https://openalex.org/W1975675278","https://openalex.org/W1993180463","https://openalex.org/W1999798506","https://openalex.org/W2001294232","https://openalex.org/W2012337958","https://openalex.org/W2018209358","https://openalex.org/W2123470003","https://openalex.org/W2124493593","https://openalex.org/W2135570789","https://openalex.org/W2158752313","https://openalex.org/W2204102791","https://openalex.org/W2288973450","https://openalex.org/W2294920278","https://openalex.org/W2296701710","https://openalex.org/W2340272936","https://openalex.org/W2341836944","https://openalex.org/W2405325693","https://openalex.org/W2406832754","https://openalex.org/W2414564754","https://openalex.org/W2490371999","https://openalex.org/W2516732942","https://openalex.org/W2519585730","https://openalex.org/W2561208905","https://openalex.org/W2566247372","https://openalex.org/W2572522725","https://openalex.org/W2574889493","https://openalex.org/W2579545915","https://openalex.org/W2580986288","https://openalex.org/W2587013451","https://openalex.org/W2593704304","https://openalex.org/W2593900992","https://openalex.org/W2594590543","https://openalex.org/W2605615119","https://openalex.org/W2605933137","https://openalex.org/W2606791856","https://openalex.org/W2614448992","https://openalex.org/W2739928414","https://openalex.org/W2743241167","https://openalex.org/W2743642702","https://openalex.org/W2759047281","https://openalex.org/W2766912013","https://openalex.org/W2769151743","https://openalex.org/W2772477883","https://openalex.org/W2783474208","https://openalex.org/W2784711417","https://openalex.org/W2795512198","https://openalex.org/W2798140685","https://openalex.org/W2798535208","https://openalex.org/W2808173391","https://openalex.org/W2883344982","https://openalex.org/W2883599316","https://openalex.org/W2885702112","https://openalex.org/W2887294876","https://openalex.org/W2901447795","https://openalex.org/W2904923446","https://openalex.org/W2910853601","https://openalex.org/W4251386558","https://openalex.org/W4285820893","https://openalex.org/W4288635545"],"related_works":["https://openalex.org/W2013238834","https://openalex.org/W1811024770","https://openalex.org/W110733897","https://openalex.org/W4230385779","https://openalex.org/W2379552567","https://openalex.org/W2369652520","https://openalex.org/W2620426095","https://openalex.org/W2966932748","https://openalex.org/W2230944779","https://openalex.org/W2212781452"],"abstract_inverted_index":{"Over":[0],"the":[1,5,13,23,56,77,80,136,142],"past":[2],"few":[3],"decades,":[4],"automotive":[6,113],"industry":[7],"was":[8,21],"mostly":[9],"focused":[10],"on":[11,46,79,128],"testing":[12,27,44,86,111,125,153,162],"safety":[14,161],"aspects":[15],"of":[16,94,131,141],"a":[17,37,71,148],"vehicle.":[18],"However,":[19],"this":[20,67],"not":[22],"case":[24],"with":[25],"security":[26,43,85,110,124,151,159],"as":[28,155,157],"it":[29],"only":[30],"began":[31],"to":[32],"be":[33],"addressed":[34],"recently.":[35],"As":[36],"result,":[38],"multiple":[39,123],"approaches":[40,108],"applying":[41],"various":[42],"techniques":[45,126],"different":[47],"software-based":[48],"vehicle":[49,97,132],"IT":[50],"components":[51],"emerged.":[52],"With":[53],"that":[54],"said,":[55],"research":[57],"and":[58,100,118,138,160],"practice":[59],"lack":[60],"an":[61],"overview":[62],"about":[63],"these":[64],"techniques.":[65],"In":[66,103],"paper,":[68],"we":[69],"conduct":[70],"systematic":[72],"mapping":[73],"study.":[74],"This":[75],"involved":[76],"investigation":[78],"following":[81],"five":[82],"dimensions:":[83],"(1)":[84],"techniques,":[87],"(2)":[88],"AUTOSAR":[89,143],"layers,":[90],"(3)":[91],"functional":[92],"interfaces":[93],"AUTOSAR,":[95],"(4)":[96],"lifecycle":[98],"phases":[99,130],"(5)":[101],"attacks.":[102],"total,":[104],"39":[105],"papers":[106],"presenting":[107],"for":[109,150],"in":[112],"engineering":[114],"were":[115],"systematically":[116],"selected":[117],"classified.":[119],"The":[120],"results":[121],"identify":[122],"focusing":[127],"early":[129],"life":[133],"cycle":[134],"through":[135],"application":[137],"services":[139],"layer":[140],"architecture.":[144],"Finally,":[145],"there":[146],"is":[147],"need":[149],"regression":[152],"approaches,":[154],"well":[156],"combined":[158],"approaches.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
