Publication:

Yes we CAN! Towards bringing security to legacy-restricted Controller Area Networks. A review

Date

 
dc.contributor.authorHellemans, Wouter
dc.contributor.authorRabbani, Md Masoom
dc.contributor.authorPreneel, Bart
dc.contributor.authorMentens, Nele
dc.contributor.imecauthorPreneel, Bart
dc.date.accessioned2024-04-30T07:44:07Z
dc.date.available2024-03-02T17:43:15Z
dc.date.available2024-04-30T07:44:07Z
dc.date.issued2023
dc.description.wosFundingTextThis work is supported by CyberSecurity Research Flanders with reference number VR20192203. This work is also partially supported by the COllective Research NETworking (CORNET) project "TrustedIOT: Trusted Computing Architectures for IoT Devices". The Belgian partners are funded by VLAIO under grant number HBC.2021.0895.
dc.identifier.doi10.1145/3587135.3592818
dc.identifier.eisbn979-8-4007-0140-5
dc.identifier.issnN/A
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/43619
dc.publisherASSOC COMPUTING MACHINERY
dc.source.beginpage352
dc.source.conference20th ACM International Conference on Computing Frontiers (CF)
dc.source.conferencedateMAY 09-11, 2023
dc.source.conferencelocationBologna
dc.source.endpage357
dc.source.journalN/A
dc.source.numberofpages6
dc.subject.keywordsEFFICIENT AUTHENTICATION
dc.subject.keywordsINTRUSION DETECTION
dc.title

Yes we CAN! Towards bringing security to legacy-restricted Controller Area Networks. A review

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: