Guilbon, J. (2018). Attacking the ARM’s TrustZone. https:
//blog.quarkslab.com/attacking-the-arms-trustzone.
html. (Accessed on 02/17/2022).
Humayed, A. and Luo, B. (2017). Using ID-Hopping to
Defend against Targeted DoS on CAN. In Proceed-
ings of the 1st International Workshop on Safe Control
of Connected and Autonomous Vehicles, pages 19–26.
ACM.
Kneib, M. and Huth, C. (2018). Scission: Signal
Characteristic-Based Sender Identification and Intru-
sion Detection in Automotive Networks. In Proceed-
ings of the 2018 ACM SIGSAC Conference on Com-
puter and Communications Security (CCS), pages
787–800. ACM.
Kneib, M., Schell, O., and Huth, C. (2020). EASI: Edge-
Based Sender Identification on Resource-Constrained
Platforms for Automotive Networks. In Proceedings
of the 27th Network and Distributed System Security
Symposium (NDSS), pages 1–16.
Kurachi, R., Matsubara, Y., Takada, H., Adachi, N.,
Miyashita, Y., and Horihata, S. (2014). CaCAN-
Centralized Authentication System in CAN (Con-
troller Area Network). In 14th Int. Conf. on Embedded
Security in Cars (ESCAR 2014).
Linux-Foundation (2019). Automotive Grade Linux.
https://www.automotivelinux.org/. (Accessed on
07/08/2019).
Machiry, A., Gustafson, E., Spensky, C., Salls, C.,
Stephens, N., Wang, R., Bianchi, A., Choe, Y. R.,
Kruegel, C., and Vigna, G. (2017). BOOMERANG:
Exploiting the Semantic Gap in Trusted Execution En-
vironments. In NDSS.
Marchetti, M. and Stabili, D. (2017). Anomaly Detection
of CAN Bus Messages through Analysis of ID Se-
quences. In 2017 IEEE Intelligent Vehicles Sympo-
sium (IV), pages 1577–1583. IEEE.
Miller, C. and Valasek, C. (2015). Remote Exploitation
of An Unaltered Passenger Vehicle. Black Hat USA,
2015:1–91.
Mishra, T., Chantem, T., and Gerdes, R. (2020).
TEECheck: Securing Intra-Vehicular Communication
Using Trusted Execution. In Proceedings of the 28th
International Conference on Real-Time Networks and
Systems (RTNS), pages 128–138.
Müter, M., Groll, A., and Freiling, F. C. (2010). A Struc-
tured Approach to Anomaly Detection for In-Vehicle
Networks. In 2010 Sixth International Conference on
Information Assurance and Security, pages 92–98.
Nie, S., Liu, L., and Du, Y. (2017). Free-Fall: Hacking
Tesla from Wireless to CAN Bus. Black Hat USA,
2017:1–16.
Ohira, S., Araya, K. D., Arai, I., and Fujikawa, K. (2021).
PLI-TDC: Super Fine Delay-Time Based Physical-
Layer Identification with Time-to-Digital Converter
for In-Vehicle Networks. In Proceedings of the 2021
ACM Asia Conference on Computer and Communica-
tions Security (ASIACCS), pages 1–11. ACM.
Ohira, S., Araya, K. D., Arai, I., Inoue, H., and Fujikawa,
K. (2020). Normal and Malicious Sliding Windows
Similarity Analysis Method for Fast and Accurate IDS
against DoS Attacks on In-Vehicle Networks. IEEE
Access, 8:42422–42435.
Pesé, M. D., Schauer, J. W., Li, J., and Shin, K. G. (2021).
S2-CAN: Sufficiently Secure Controller Area Net-
work. In Proceedings of the 37th Annual Computer
Security Applications Conference (ACSAC), ACSAC,
page 425–438, New York, NY, USA. Association for
Computing Machinery.
Robert-Bosch-GmbH (1991). CAN Specification Version
2.0. http://esd.cs.ucr.edu/webres/can20.pdf. (Ac-
cessed on 07/08/2019).
Sivakumar, P., Devi, R. S., Lakshmi, A. N., VinothKumar,
B., and Vinod, B. (2020). Automotive grade linux
software architecture for automotive infotainment sys-
tem. In 2020 International Conference on Inventive
Computation Technologies (ICICT), pages 391–395.
IEEE.
Song, H. M., Kim, H. R., and Kim, H. K. (2016). Intru-
sion Detection System Based on the Analysis of Time
Intervals of CAN Messages for In-Vehicle Network.
In 2016 international conference on information net-
working (ICOIN), pages 63–68. IEEE.
Takada, M., Osada, Y., and Morii, M. (2019). Counter At-
tack against the Bus-off Attack on CAN. In 2019 14th
Asia Joint Conference on Information Security (Asia-
JCIS), pages 96–102. IEEE.
Woo, S., Moon, D., Youn, T.-Y., Lee, Y., and Kim, Y.
(2019). CAN ID Shuffling Technique (CIST): Mov-
ing Target Defense Strategy for Protecting In-Vehicle
CAN. IEEE Access, 7:15521–15536.
Wu, W., Huang, Y., Kurachi, R., Zeng, G., Xie, G., Li, R.,
and Li, K. (2018a). Sliding Window Optimized Infor-
mation Entropy Analysis Method for Intrusion Detec-
tion on In-Vehicle Networks. IEEE Access, 6:45233–
45245.
Wu, W., Kurachi, R., Zeng, G., Matsubara, Y., Takada,
H., Li, R., and Li, K. (2018b). IDH-CAN: A
Hardware-Based ID Hopping CAN Mechanism With
Enhanced Security for Automotive Real-Time Appli-
cations. IEEE Access, 6:54607–54623.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
28