Bogdan Groza
Orcid: 0000-0003-3078-3635
According to our database1,
Bogdan Groza
authored at least 85 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cyberattacks on Adaptive Cruise Controls and Emergency Braking Systems: Adversary Models, Impact Assessment, and Countermeasures.
IEEE Trans. Reliab., June, 2024
IEEE Trans. Ind. Informatics, February, 2024
2023
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers.
IEEE Internet Things J., August, 2023
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023
Impact of Wiring Characteristics on Voltage-based Fingerprinting in Controller Area Networks.
Proceedings of the 17th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2023
Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks.
Proceedings of the 17th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2023
2022
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus.
IEEE Trans. Intell. Transp. Syst., 2022
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles.
IEEE Trans. Inf. Forensics Secur., 2022
Smartphone Camera Identification from Low-Mid Frequency DCT Coefficients of Dark Images.
Entropy, 2022
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022
Android Head Units vs. In-Vehicle ECUs: Performance Assessment for Deploying In-Vehicle Intrusion Detection Systems for the CAN Bus.
IEEE Access, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition.
Proceedings of the IEEE International Conference on Automation, 2022
2021
IEEE Trans. Veh. Technol., 2021
CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN.
IEEE Trans. Inf. Forensics Secur., 2021
Int. J. Inf. Sec., 2021
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
IEEE Trans. Veh. Technol., 2020
Highly Efficient Authentication for CAN by Identifier Reallocation With Ordered CMACs.
IEEE Trans. Veh. Technol., 2020
Sensors, 2020
TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Access, 2019
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study.
Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, 2019
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks.
IEEE Veh. Technol. Mag., 2018
Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol.
IEEE Trans. Veh. Technol., 2018
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
INCANTA - INtrusion Detection in Controller Area Networks with Time-Covert Authentication.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
A brief look at the security of DeviceNet communication in industrial control systems.
Proceedings of the Central European Cybersecurity Conference 2018, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017
Designing Wireless Automotive Keys with Rights Sharing Capabilities on the MSP430 Microcontroller.
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017
A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices.
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered Viewpoint.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 10th Workshop on Embedded Systems Security, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
2014
IEEE Signal Process. Lett., 2014
2013
IEEE Trans. Ind. Informatics, 2013
Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms.
Int. J. Secur. Softw. Eng., 2013
Int. J. Mob. Comput. Multim. Commun., 2013
Proceedings of the Critical Information Infrastructures Security, 2013
2012
Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012
Proceedings of the Information Security - 15th International Conference, 2012
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Higher Layer Authentication for Broadcast in Controller Area Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Performance improvements for SHA-3 finalists by exploiting microcontroller on-chip parallelism.
Proceedings of the CRiSIS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the 5th International Symposium on Applied Computational Intelligence and Informatics, 2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
2007
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java.
Proceedings of the 4th International Symposium on Applied Computational Intelligence and Informatics, 2007
On the use of one-way chain based authentication protocols in secure control systems.
Proceedings of the The Second International Conference on Availability, 2007
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain.
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Proceedings of the Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2005), 2005