ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.00497
  4. Cited By
Identifying ECUs Using Inimitable Characteristics of Signals in
  Controller Area Networks

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

2 July 2016
W. Choi
Hyo Jin Jo
Samuel Woo
J. Chun
Jooyoung Park
Dong Hoon Lee
ArXiv (abs)PDFHTML

Papers citing "Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks"

14 / 14 papers shown
Title
Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation
Yangyang Liu
Lei Xue
Sishan Wang
Xiapu Luo
Kaifa Zhao
Pengfei Jing
Xiaobo Ma
Y. Tang
Haiying Zhou
AAML
39
0
0
22 May 2025
Electric Vehicle Charging: a Survey on the Security Issues and
  Challenges of the Open Charge Point Protocol (OCPP)
Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)
Zacharenia Garofalaki
Dimitrios Kosmanos
S. Moschoyiannis
Dimitrios N. Kallergis
Christos Douligeris
50
72
0
05 Jul 2022
EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
F. Oberti
A. Savino
Ernesto Sánchez
Filippo Parisi
S. Di Carlo
14
4
0
15 Dec 2021
A Model-Driven Methodology for Automotive Cybersecurity Test Case
  Generation
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation
Stefan Marksteiner
P. Priller
AAML
32
3
0
13 Jul 2021
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU
  Masquerading Attacks
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks
Shabbir Ahmed
M. Juliato
Christopher Gutierrez
Manoj R. Sastry
28
5
0
19 Feb 2021
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things
  and Cyber-Physical Systems based on Machine Learning
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Tanujay Saha
N. Aaraj
Neel Ajjarapu
N. Jha
50
26
0
07 Jan 2021
Graph-Based Intrusion Detection System for Controller Area Networks
Graph-Based Intrusion Detection System for Controller Area Networks
Riadul Islam
Rafi Ud Daula Refat
Sai Manikanta Yerram
Hafiz Malik
38
70
0
24 Sep 2020
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
Shailja Thakur
Carlos Moreno
S. Fischmeister
123
5
0
12 Jun 2020
On the Robustness of Signal Characteristic-Based Sender Identification
On the Robustness of Signal Characteristic-Based Sender Identification
Marcel Kneib
Oleg Schell
Christopher Huth
11
8
0
22 Nov 2019
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
Nasser Nowdehi
Wissam Aoudi
Magnus Almgren
T. Olovsson
AAML
38
26
0
18 Sep 2019
Towards a CAN IDS based on a neural-network data field predictor
Towards a CAN IDS based on a neural-network data field predictor
Krzysztof Pawelec
Robert A. Bridges
Frank L. Combs
AAML
35
30
0
30 Dec 2018
Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection
Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection
Zachariah Tyree
Robert A. Bridges
Frank L. Combs
M. R. Moore
AAML
29
18
0
28 Aug 2018
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion
  Detection System in Controller Area Networks
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks
Xuhang Ying
Sagong Uk Sang
Andrew Clark
L. Bushnell
Radha Poovendran
45
57
0
25 Jul 2018
Viden: Attacker Identification on In-Vehicle Networks
Viden: Attacker Identification on In-Vehicle Networks
Kyong-Tak Cho
Kang G. Shin
60
203
0
28 Aug 2017
1