ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.08414
  4. Cited By
Viden: Attacker Identification on In-Vehicle Networks

Viden: Attacker Identification on In-Vehicle Networks

28 August 2017
Kyong-Tak Cho
Kang G. Shin
ArXiv (abs)PDFHTML

Papers citing "Viden: Attacker Identification on In-Vehicle Networks"

33 / 33 papers shown
Title
Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation
Yangyang Liu
Lei Xue
Sishan Wang
Xiapu Luo
Kaifa Zhao
Pengfei Jing
Xiaobo Ma
Y. Tang
Haiying Zhou
AAML
39
0
0
22 May 2025
HackCar: a test platform for attacks and defenses on a cost-contained
  automotive architecture
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture
Dario Stabili
Filip Valgimigli
Edoardo Torrini
Mirco Marchetti
AAML
65
1
0
08 May 2024
Benchmarking Frameworks and Comparative Studies of Controller Area
  Network (CAN) Intrusion Detection Systems: A Review
Benchmarking Frameworks and Comparative Studies of Controller Area Network (CAN) Intrusion Detection Systems: A Review
Shaila Sharmin
Hafizah Mansor
Andi Fitriah Abdul Kadir
N. A. Aziz
56
1
0
10 Feb 2024
A Lightweight FPGA-based IDS-ECU Architecture for Automotive CAN
A Lightweight FPGA-based IDS-ECU Architecture for Automotive CAN
Shashwat Khandelwal
Shanker Shreejith
54
14
0
19 Jan 2024
A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid
  FPGAs
A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs
Shashwat Khandelwal
Shanker Shreejith
48
11
0
19 Jan 2024
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion
  Detection and Classification
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification
Xuemei Li
Huirong Fu
36
5
0
19 Nov 2023
Performance comparison of timing-based anomaly detectors for Controller
  Area Network: a reproducible study
Performance comparison of timing-based anomaly detectors for Controller Area Network: a reproducible study
Francesco Pollicino
Dario Stabili
Mirco Marchetti
AI4TS
55
9
0
10 Jul 2023
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off
  Attacks
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks
Sunandan Adhikary
Ipsita Koley
Arkaprava Sain
Soumyadeep das
Shuvam Saha
Soumyajit Dey
AAML
11
0
0
15 Jun 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion
  Detection
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese
Pavel Laskov
J. Schneider
114
26
0
30 Apr 2023
Communication Security in the Internet of Vehicles based Industrial
  Value Chain
Communication Security in the Internet of Vehicles based Industrial Value Chain
Yuanfang Chen
Muhammad Alam
Xiaohua Xu
20
0
0
14 Jan 2023
Security and Interpretability in Automotive Systems
Security and Interpretability in Automotive Systems
Shailja Thakur
AAML
35
0
0
23 Dec 2022
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on
  Automotive Networks
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
Alvise de Faveri Tron
Stefano Longari
Michele Carminati
Mario Polino
S. Zanero
AAML
75
21
0
20 Sep 2022
CANShield: Deep Learning-Based Intrusion Detection Framework for
  Controller Area Networks at the Signal-Level
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level
Md Hasan
Member Ieee Yang Xiao
Senior Member Ieee Pablo Moriano
Fellow Ieee Wenjing Lou
F. I. Y. Thomas Hou
72
23
0
03 May 2022
A Systematic Survey of Attack Detection and Prevention in Connected and
  Autonomous Vehicles
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles
Trupil Limbasiya
Ko Zheng Teng
Sudipta Chattopadhyay
Jianying Zhou
50
51
0
27 Mar 2022
Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
M. Rogers
K. Rasmussen
AAML
31
5
0
17 Jan 2022
TENET: Temporal CNN with Attention for Anomaly Detection in Automotive
  Cyber-Physical Systems
TENET: Temporal CNN with Attention for Anomaly Detection in Automotive Cyber-Physical Systems
S. V. Thiruloga
Vipin Kumar Kukkala
S. Pasricha
72
23
0
09 Sep 2021
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an
  In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Efrat Levy
A. Shabtai
B. Groza
Pal-Stefan Murvay
Yuval Elovici
36
22
0
15 Jun 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Zhiyuan Yu
Zack Kaplan
Qiben Yan
Ning Zhang
51
32
0
27 May 2021
Securing the Electric Vehicle Charging Infrastructure
Securing the Electric Vehicle Charging Infrastructure
Roberto Metere
M. Neaimeh
C. Morisset
Carsten Maple
X. Bellekens
R. Czekster
34
30
0
06 May 2021
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU
  Masquerading Attacks
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks
Shabbir Ahmed
M. Juliato
Christopher Gutierrez
Manoj R. Sastry
28
5
0
19 Feb 2021
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
Miki E. Verma
Robert A. Bridges
Michael D. Iannacone
Samuel C. Hollifield
Pablo Moriano
Steven C. Hespeler
Bill Kay
Frank L. Combs
AAML
86
38
0
29 Dec 2020
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
Shailja Thakur
Carlos Moreno
S. Fischmeister
123
5
0
12 Jun 2020
Cyberattacks and Countermeasures For In-Vehicle Networks
Cyberattacks and Countermeasures For In-Vehicle Networks
Emad Aliwa
Omer F. Rana
Charith Perera
Pete Burnap
AAML
43
148
0
22 Apr 2020
Hardware Fingerprinting for the ARINC 429 Avionic Bus
Hardware Fingerprinting for the ARINC 429 Avionic Bus
Nimrod Gilboa Markevich
A. Wool
18
11
0
27 Mar 2020
Covert Channel-Based Transmitter Authentication in Controller Area
  Networks
Covert Channel-Based Transmitter Authentication in Controller Area Networks
Xuhang Ying
Giuseppe Bernieri
Mauro Conti
L. Bushnell
Radha Poovendran
39
8
0
08 Dec 2019
CANTO -- Covert AutheNtication with Timing channels over Optimized
  traffic flows for CAN
CANTO -- Covert AutheNtication with Timing channels over Optimized traffic flows for CAN
B. Groza
L. Popa
Pal-Stefan Murvay
15
14
0
25 Nov 2019
On the Robustness of Signal Characteristic-Based Sender Identification
On the Robustness of Signal Characteristic-Based Sender Identification
Marcel Kneib
Oleg Schell
Christopher Huth
11
8
0
22 Nov 2019
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
Nasser Nowdehi
Wissam Aoudi
Magnus Almgren
T. Olovsson
AAML
38
26
0
18 Sep 2019
Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems
  in Controller Area Networks
Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks
Sagong Uk Sang
Radha Poovendran
L. Bushnell
AAML
33
6
0
25 Jul 2019
Network intrusion detection systems for in-vehicle network - Technical
  report
Network intrusion detection systems for in-vehicle network - Technical report
G. Dupont
J. Hartog
S. Etalle
Alexios Lekidis
13
6
0
28 May 2019
TACAN: Transmitter Authentication through Covert Channels in Controller
  Area Networks
TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks
Xuhang Ying
Giuseppe Bernieri
Mauro Conti
Radha Poovendran
41
46
0
12 Mar 2019
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion
  Detection System in Controller Area Networks
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks
Xuhang Ying
Sagong Uk Sang
Andrew Clark
L. Bushnell
Radha Poovendran
45
57
0
25 Jul 2018
Vehicle Security: Risk Assessment in Transportation
Vehicle Security: Risk Assessment in Transportation
K. Kelarestaghi
Mahsa Foruhandeh
K. Heaslip
Ryan M. Gerdes
22
15
0
19 Apr 2018
1