Abstract is missing.
- Revisiting Automotive Threat Analysis by Leveraging the Elements of the Threat LandscapeAlexander Åström. 1-12 [doi]
- Achieving the Safety and Security of the End-to-End AV PipelineNoah T. Curran, Minkyoung Cho, Ryan Feng, Liangkai Liu, Brian Jay Tang, Pedram MohajerAnsari, Alkim Domeke, Mert D. Pesé, Kang G. Shin. 13-24 [doi]
- SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware TrustFlorian Fenzl, Jonathan Stancke, Christian Plappert, Roland Rieke, Felix Clemens Gail, Theo Dimitrakos, Hussein Joumaa. 25-38 [doi]
- AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)Lorenzo Guerra, Linhan Xu, Paolo Bellavista, Thomas Chapuis, Guillaume Duc, Pavlo Mozharovskyi, Van Tam Nguyen. 39-49 [doi]
- (Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication ServiceTimm Lauser, Gideon Munoz Molto, Christoph Krauß. 50-60 [doi]
- Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management SystemsMarco Michl, Hans-Joachim Hof, Stefan Katzenbeisser 0001. 61-75 [doi]
- V2X Misbehavior in Decentralized Notification Basic Service: Considerations for StandardizationJean Philippe Monteuuis, Jonathan Petit, Cong Chen, Soumya Das, Mohammad Nekoui, Seung Yang. 76-84 [doi]