{"id":"https://openalex.org/W4396648559","doi":"https://doi.org/10.1145/3653081.3653086","title":"In-Vehicle Network Attack Based on CAN and UDS: Demonstration and Analysis","display_name":"In-Vehicle Network Attack Based on CAN and UDS: Demonstration and Analysis","publication_year":2023,"publication_date":"2023-11-24","ids":{"openalex":"https://openalex.org/W4396648559","doi":"https://doi.org/10.1145/3653081.3653086"},"language":"en","primary_location":{"id":"doi:10.1145/3653081.3653086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3653081.3653086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082657293","display_name":"Shixuan Ren","orcid":"https://orcid.org/0009-0002-3794-2651"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shixuan Ren","raw_affiliation_strings":["China Automotive Technology and Research Center Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"China Automotive Technology and Research Center Co., Ltd, China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025500827","display_name":"Zhen Guo","orcid":"https://orcid.org/0000-0001-9110-673X"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Guo","raw_affiliation_strings":["China Automotive Technology and Research Center Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"China Automotive Technology and Research Center Co., Ltd, China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091898012","display_name":"Yuqiao Ning","orcid":"https://orcid.org/0000-0002-9368-0185"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqiao Ning","raw_affiliation_strings":["China Automotive Technology and Research Center Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"China Automotive Technology and Research Center Co., Ltd, China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087223581","display_name":"Qi Yu","orcid":"https://orcid.org/0009-0000-9383-5629"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Yu","raw_affiliation_strings":["China Automotive Technology and Research Center Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"China Automotive Technology and Research Center Co., Ltd, China","institution_ids":["https://openalex.org/I4210094894"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010708046","display_name":"Longhai Yu","orcid":"https://orcid.org/0000-0002-9624-5453"},"institutions":[{"id":"https://openalex.org/I4210094894","display_name":"China Automotive Technology and Research Center","ror":"https://ror.org/00r5r6807","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210094894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longhai Yu","raw_affiliation_strings":["China Automotive Technology and Research Center Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"China Automotive Technology and Research Center Co., Ltd, China","institution_ids":["https://openalex.org/I4210094894"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082657293"],"corresponding_institution_ids":["https://openalex.org/I4210094894"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21573665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7062796354293823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6569667458534241},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6518632173538208},{"id":"https://openalex.org/keywords/can-bus","display_name":"CAN bus","score":0.5219666361808777},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.5143595933914185},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.47911787033081055},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4501138925552368},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4290938675403595},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.42848560214042664},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4242377281188965},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.18164411187171936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7062796354293823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6569667458534241},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6518632173538208},{"id":"https://openalex.org/C201762086","wikidata":"https://www.wikidata.org/wiki/Q728183","display_name":"CAN bus","level":2,"score":0.5219666361808777},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.5143595933914185},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.47911787033081055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4501138925552368},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4290938675403595},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.42848560214042664},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4242377281188965},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.18164411187171936},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3653081.3653086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3653081.3653086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2125246147","https://openalex.org/W2759891682","https://openalex.org/W2979202956","https://openalex.org/W4200308385","https://openalex.org/W4295088039"],"related_works":["https://openalex.org/W3174401943","https://openalex.org/W2757540250","https://openalex.org/W4200505899","https://openalex.org/W3134606046","https://openalex.org/W2389027349","https://openalex.org/W2943967608","https://openalex.org/W3020635636","https://openalex.org/W4214881753","https://openalex.org/W4377000511","https://openalex.org/W2593957913"],"abstract_inverted_index":{"With":[0],"the":[1,19,29,69,77,119,127,130,140],"development":[2],"of":[3,32,40,71,121,129],"smart":[4],"internet-connected":[5],"vehicles,":[6,26,112],"in-vehicle":[7,122],"networks":[8],"are":[9,136],"facing":[10],"increasing":[11],"security":[12,120,133],"threats.":[13],"Controller":[14],"Area":[15],"Network":[16,132],"(CAN),":[17],"as":[18],"most":[20,85],"commonly":[21],"used":[22],"communication":[23],"method":[24,93],"in":[25,110],"has":[27],"become":[28],"main":[30],"target":[31],"malicious":[33],"network":[34,124],"attacks":[35],"due":[36],"to":[37,68,117],"its":[38],"lack":[39],"security.":[41],"This":[42,88],"paper":[43,89],"focuses":[44],"on":[45,63,95,126,139],"three":[46,65,79],"common":[47],"attack":[48,60,81],"methods:":[49],"CAN":[50,80,100,123],"message":[51,101],"injection,":[52],"replay":[53],"and":[54,57,74,103,113],"Dos":[55],"attack,":[56,105],"designs":[58],"five":[59],"experiments":[61,82],"based":[62,94,125,138],"these":[64],"methods.":[66],"Due":[67],"upgrading":[70],"vehicle":[72],"electronic":[73],"electrical":[75],"architectures,":[76],"traditional":[78],"cannot":[83],"affect":[84],"new":[86,111],"vehicles.":[87],"proposes":[90,114],"an":[91],"experimental":[92,141],"UDS":[96],"(Unified":[97],"Diagnostic":[98],"Services)":[99],"injection":[102],"DoS":[104],"which":[106],"causes":[107],"functional":[108],"interference":[109],"protective":[115],"measures":[116,135],"safeguard":[118],"analysis":[128],"experiments.":[131],"protection":[134],"proposed":[137],"analysis.":[142]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
