iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3609508
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T12:41:14Z","timestamp":1726144874754},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"name":"Concordia University\/Hydro-Quebec\/NSERC"},{"name":"Large-scale Integration of EVCSs into the Smart Grid: A Comprehensive Cyber-physical Study and Security Assessment","award":["ALLRP 567144-21"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2023,10,31]]},"abstract":"The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start\/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this article, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user\/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging\/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.<\/jats:p>","DOI":"10.1145\/3609508","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T12:07:46Z","timestamp":1690546066000},"page":"1-28","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Investigating the Security of EV Charging Mobile Applications as an Attack Surface"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6099-2502","authenticated-orcid":false,"given":"Khaled","family":"Sarieddine","sequence":"first","affiliation":[{"name":"The Security Research Centre, Concordia University, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6178-453X","authenticated-orcid":false,"given":"Mohammad Ali","family":"Sayed","sequence":"additional","affiliation":[{"name":"The Security Research Centre, Concordia University, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2811-3536","authenticated-orcid":false,"given":"Sadegh","family":"Torabi","sequence":"additional","affiliation":[{"name":"Center for Secure Information Systems, George Mason University, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9582-6478","authenticated-orcid":false,"given":"Ribal","family":"Atallah","sequence":"additional","affiliation":[{"name":"Hydro-Quebec Research Institute, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3161-1846","authenticated-orcid":false,"given":"Chadi","family":"Assi","sequence":"additional","affiliation":[{"name":"The Security Research Centre, Concordia University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Helen Regan. 2020. China pledges to go carbon neutral by 2060. https:\/\/www.cnn.com\/2020\/09\/22\/china\/xi-jinping-carbon-neutral-2060-intl-hnk\/index.html"},{"key":"e_1_3_1_3_2","unstructured":"Linda Gyulai. 2020. Montreal\u2019s climate plan includes ban on non-electric cars downtown by 2030. https:\/\/montrealgazette.com\/news\/local-news\/montreal-releases-climate-plan-including-ban-on-non-electric-cars-downtown-by-2030"},{"key":"e_1_3_1_4_2","unstructured":"Charles Riley. 2021. Europe aims to kill gasoline and diesel cars by 2035. https:\/\/edition.cnn.com\/2021\/07\/14\/business\/eu-emissions-climate-cars\/index.html"},{"key":"e_1_3_1_5_2","unstructured":"Natural Resources Canada. 2021. Government of Canada. https:\/\/www.nrcan.gc.ca\/energy-efficiency\/transportation-alternative-fuels\/zero-emission-vehicle-infrastructure-program\/21876"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041074"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107784"},{"key":"e_1_3_1_8_2","first-page":"102511","article-title":"Power jacking your station: In-depth security analysis of electric vehicle charging station management systems","author":"Nasr Tony","year":"2021","unstructured":"Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, and Chadi Assi. 2021. Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. Computers & Security (2021), 102511.","journal-title":"Computers & Security"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148345"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2669647"},{"key":"e_1_3_1_11_2","first-page":"1","volume-title":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201918)","author":"Rubio Juan E.","year":"2018","unstructured":"Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201918). IEEE, 1\u20135."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3437258"},{"issue":"3","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/MNET.001.1900348","article-title":"A detailed security assessment of the EV charging ecosystem","volume":"34","author":"Antoun Joseph","year":"2020","unstructured":"Joseph Antoun, Mohammad Ekramul Kabir, Bassam Moussa, Ribal Atallah, and Chadi Assi. 2020. A detailed security assessment of the EV charging ecosystem. IEEE Network 34, 3 (2020), 200\u2013207.","journal-title":"IEEE Network"},{"key":"e_1_3_1_14_2","unstructured":"Open Charge Alliance. 2021. OCPP 2.0.1 protocols home. https:\/\/www.openchargealliance.org\/protocols\/ocpp-201\/"},{"key":"e_1_3_1_15_2","first-page":"407","volume-title":"28th USENIX Security Symposium (USENIX Security\u201919)","author":"Baker Richard","year":"2019","unstructured":"Richard Baker and Ivan Martinovic. 2019. Losing the car keys: Wireless phy-layer insecurity in EV charging. In 28th USENIX Security Symposium (USENIX Security\u201919). 407\u2013424."},{"issue":"2","key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"899","DOI":"10.4130\/jaev.4.899","article-title":"Battery sizing for plug-in hybrid electric vehicles","volume":"4","author":"Wong Y. S.","year":"2006","unstructured":"Y. S. Wong, K. T. Chau, and C. C. Chan. 2006. Battery sizing for plug-in hybrid electric vehicles. Journal of Asian Electric Vehicles 4, 2 (2006), 899\u2013904.","journal-title":"Journal of Asian Electric Vehicles"},{"key":"e_1_3_1_17_2","unstructured":"Kaspersky Lab. 2021. How do fuel cell electric vehicles work Using hydrogen?https:\/\/afdc.energy.gov\/vehicles\/how-do-fuel-cell-electric-cars-work"},{"key":"e_1_3_1_18_2","unstructured":"Sklyar Dmitry. 2018. ChargePoint Home Security Research. https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2018\/12\/13084354\/ChargePoint-Home-security-research_final.pdf"},{"key":"e_1_3_1_19_2","first-page":"1","volume-title":"2018 9th IFIP International Conference on New Technologies, Mobility and Security","author":"Rubio Juan E.","year":"2018","unstructured":"Juan E. Rubio, Cristina Alcaraz, and Javier Lopez. 2018. Addressing security in OCPP: Protection against man-in-the-middle attacks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security. 1\u20135."},{"key":"e_1_3_1_20_2","first-page":"1","volume-title":"2019 IEEE Electrical Power and Energy Conference (EPEC\u201919)","author":"Khan Omniyah Gul M.","year":"2019","unstructured":"Omniyah Gul M. Khan, Ehab El-Saadany, Amr Youssef, and Mostafa Shaaban. 2019. Impact of electric vehicles botnets on the power grid. In 2019 IEEE Electrical Power and Energy Conference (EPEC\u201919). IEEE, 1\u20135."},{"issue":"1","key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TPWRS.2009.2036481","article-title":"The impact of charging plug-in hybrid electric vehicles on a residential distribution grid","volume":"25","author":"Clement-Nyns Kristien","year":"2009","unstructured":"Kristien Clement-Nyns, Edwin Haesen, and Johan Driesen. 2009. The impact of charging plug-in hybrid electric vehicles on a residential distribution grid. IEEE Transactions on Power Systems 25, 1 (2009), 371\u2013380.","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1109\/TSG.2014.2307897","article-title":"Impact of electric vehicle on-board single-phase charging strategies on a flemish residential grid","volume":"5","author":"Leemput Niels","year":"2014","unstructured":"Niels Leemput, Frederik Geth, Juan Van Roy, Annelies Delnooz, Jeroen B\u00fcscher, and Johan Driesen. 2014. Impact of electric vehicle on-board single-phase charging strategies on a flemish residential grid. IEEE Transactions on Smart Grid 5, 4 (2014), 1815\u20131822.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2476996"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2014.03.032"},{"issue":"3","key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1109\/TSG.2013.2251483","article-title":"Investigating the impacts of plug-in hybrid electric vehicles on power distribution systems","volume":"4","author":"Shafiee Soroush","year":"2013","unstructured":"Soroush Shafiee, Mahmud Fotuhi-Firuzabad, and Mohammad Rastegar. 2013. Investigating the impacts of plug-in hybrid electric vehicles on power distribution systems. IEEE Transactions on Smart Grid 4, 3 (2013), 1351\u20131360.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2021.100477"},{"key":"e_1_3_1_27_2","first-page":"1133","volume-title":"28th USENIX Security Symposium (USENIX Security\u201919)","author":"Zhou Wei","year":"2019","unstructured":"Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. 2019. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. In 28th USENIX Security Symposium (USENIX Security\u201919). 1133\u20131150."},{"key":"e_1_3_1_28_2","unstructured":"S. O\u2019Dea.2021. Mobile OS market share 2021. https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/"},{"key":"e_1_3_1_29_2","unstructured":"2021. apktool - a tool for reverse engineering 3rd party closed binary android apps.https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"e_1_3_1_30_2","unstructured":"KALI. 2021. Dex2jar: Kali linux tools. https:\/\/www.kali.org\/tools\/dex2jar\/"},{"key":"e_1_3_1_31_2","unstructured":"KALI. 2021. JD-Gui: Kali linux tools. https:\/\/www.kali.org\/tools\/jd-gui\/"},{"key":"e_1_3_1_32_2","unstructured":"MobSF. 2021. Mobile security framework (mobsf). https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF"},{"key":"e_1_3_1_33_2","unstructured":"Pkumza. 2021. pkumza\/LiteRadar: Lite version of LibRadar. https:\/\/github.com\/pkumza\/LiteRadar"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.31"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_1_36_2","unstructured":"GPS Joystick Guide-the app ninjas. n. d.http:\/\/gpsjoystick.theappninjas.com\/"},{"key":"e_1_3_1_37_2","unstructured":"SHIVAM says. 2021. Virtualxposed APK 0.20.3 download latest in 2021 [official]. https:\/\/virtualxposed.com\/"},{"key":"e_1_3_1_38_2","unstructured":"Ac-Pm. n.d. AC-PM\/inspeckage: Android Package Inspector - Dynamic Analysis with API hooks start unexported activities and more. (Xposed module). https:\/\/github.com\/ac-pm\/Inspeckage"},{"key":"e_1_3_1_39_2","unstructured":"Jens Schmutzler Claus Amtrup Andersen and Christian Wietfeld. 2021. Burp Suite - Application Security Testing Software. https:\/\/portswigger.net\/burp"},{"issue":"4","key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"863","DOI":"10.3390\/wevj6040863","article-title":"Evaluation of OCPP and IEC 61850 for smart charging electric vehicles","volume":"6","author":"Schmutzler Jens","year":"2013","unstructured":"Jens Schmutzler, Claus Amtrup Andersen, and Christian Wietfeld. 2013. Evaluation of OCPP and IEC 61850 for smart charging electric vehicles. World Electric Vehicle Journal 6, 4 (2013), 863\u2013874.","journal-title":"World Electric Vehicle Journal"},{"key":"e_1_3_1_41_2","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1109\/VPPC.2012.6422683","volume-title":"2012 IEEE Vehicle Power and Propulsion Conference","author":"Schmutzler Jens","year":"2012","unstructured":"Jens Schmutzler, Christian Wietfeld, and Claus Amtrup Andersen. 2012. Distributed energy resource management for electric vehicles using IEC 61850 and ISO\/IEC 15118. In 2012 IEEE Vehicle Power and Propulsion Conference. IEEE, 1457\u20131462."},{"key":"e_1_3_1_42_2","unstructured":"Communication apis for SMS Voice Video & Authentication. [n. d.]https:\/\/www.twilio.com\/"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2019.113732"},{"key":"e_1_3_1_44_2","first-page":"1","volume-title":"2019 IEEE Transportation Electrification Conference and Expo (ITEC\u201919)","author":"Almaghrebi Ahmad","year":"2019","unstructured":"Ahmad Almaghrebi, Subhaditya Shom, Fares Al Juheshi, Kevin James, and Mahmoud Alahmad. 2019. Analysis of user charging behavior at public charging stations. In 2019 IEEE Transportation Electrification Conference and Expo (ITEC\u201919). IEEE, 1\u20136."},{"key":"e_1_3_1_45_2","first-page":"123217","article-title":"Multistep electric vehicle charging station occupancy prediction using hybrid LSTM neural networks","author":"Ma Tai-Yu","year":"2022","unstructured":"Tai-Yu Ma and S\u00e9bastien Faye. 2022. Multistep electric vehicle charging station occupancy prediction using hybrid LSTM neural networks. Energy vol 244, part B (2022), 123217.","journal-title":"Energy"},{"key":"e_1_3_1_46_2","first-page":"139","volume-title":"Proceedings of the 10th ACM International Conference on Future Energy Systems","author":"Lee Zachary J.","year":"2019","unstructured":"Zachary J. Lee, Tongxin Li, and Steven H. Low. 2019. ACN-data: Analysis and applications of an open EV charging dataset. In Proceedings of the 10th ACM International Conference on Future Energy Systems. 139\u2013149."},{"key":"e_1_3_1_47_2","unstructured":"Appium. 2021. Automation for Apps. https:\/\/appium.io\/"},{"key":"e_1_3_1_48_2","first-page":"15","volume-title":"27th USENIX Security Symposium (USENIX Security\u201918)","author":"Soltan Saleh","year":"2018","unstructured":"Saleh Soltan, Prateek Mittal, and H. Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium (USENIX Security\u201918). 15\u201332."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3247374"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377181"},{"key":"e_1_3_1_51_2","first-page":"1","volume-title":"2019 IEEE International Conference on Consumer Electronics (ICCE\u201919)","author":"Pratt Richard M.","year":"2019","unstructured":"Richard M. Pratt and Thomas E. Carroll. 2019. Vehicle charging infrastructure security. In 2019 IEEE International Conference on Consumer Electronics (ICCE\u201919). IEEE, 1\u20135."},{"key":"e_1_3_1_52_2","unstructured":"California ISO. 2021. Demand Trend. https:\/\/www.caiso.com\/TodaysOutlook\/Pages\/default.aspx"},{"key":"e_1_3_1_53_2","unstructured":"Australian Energy Market Operator (AEMOO). 2021. Demand Trend. https:\/\/aemo.com.au\/en"},{"issue":"2","key":"e_1_3_1_54_2","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/LCSYS.2019.2926101","article-title":"Real-time identifiability of power distribution network topologies with limited monitoring","volume":"4","author":"Cavraro Guido","year":"2019","unstructured":"Guido Cavraro, Andrey Bernstein, Vassilis Kekatos, and Yingchen Zhang. 2019. Real-time identifiability of power distribution network topologies with limited monitoring. IEEE Control Systems Letters 4, 2 (2019), 325\u2013330.","journal-title":"IEEE Control Systems Letters"},{"key":"e_1_3_1_55_2","first-page":"1","volume-title":"2019 IEEE PES Innovative Smart Grid Technologies Conference-Latin America","author":"Taheri Seyed Iman","year":"2019","unstructured":"Seyed Iman Taheri, M. B. C. Salles, and N. Kagan. 2019. A new modified TLBO algorithm for placement of AVRs in distribution system. In 2019 IEEE PES Innovative Smart Grid Technologies Conference-Latin America. IEEE, 1\u20136."},{"issue":"3","key":"e_1_3_1_56_2","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TCNS.2019.2901714","article-title":"Inverter probing for power distribution network topology processing","volume":"6","author":"Cavraro Guido","year":"2019","unstructured":"Guido Cavraro and Vassilis Kekatos. 2019. Inverter probing for power distribution network topology processing. IEEE Transactions on Control of Network Systems 6, 3 (2019), 980\u2013992.","journal-title":"IEEE Transactions on Control of Network Systems"},{"issue":"1","key":"e_1_3_1_57_2","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TSG.2019.2956706","article-title":"Unsupervised impedance and topology estimation of distribution networks\u2014limitations and tools","volume":"11","author":"Moffat Keith","year":"2019","unstructured":"Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2019. Unsupervised impedance and topology estimation of distribution networks\u2014limitations and tools. IEEE Transactions on Smart Grid 11, 1 (2019), 846\u2013856.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"1","key":"e_1_3_1_58_2","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/TPWRS.2019.2935401","article-title":"Joint estimation of operational topology and outages for unbalanced power distribution systems","volume":"35","author":"Gandluru Anandini","year":"2019","unstructured":"Anandini Gandluru, Shiva Poudel, and Anamika Dubey. 2019. Joint estimation of operational topology and outages for unbalanced power distribution systems. IEEE Transactions on Power Systems 35, 1 (2019), 605\u2013617.","journal-title":"IEEE Transactions on Power Systems"},{"issue":"3","key":"e_1_3_1_59_2","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1109\/TPWRS.2019.2897004","article-title":"Topology estimation using graphical models in multi-phase power distribution grids","volume":"35","author":"Deka Deepjyoti","year":"2019","unstructured":"Deepjyoti Deka, Michael Chertkov, and Scott Backhaus. 2019. Topology estimation using graphical models in multi-phase power distribution grids. IEEE Transactions on Power Systems 35, 3 (2019), 1663\u20131673.","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_1_60_2","first-page":"1","volume-title":"2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT\u201920)","author":"Moffat Keith","year":"2020","unstructured":"Keith Moffat, Mohini Bariya, and Alexandra Von Meier. 2020. Real time effective impedance estimation for power system state estimation. In 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT\u201920). IEEE, 1\u20135."},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420009248.sec2","article-title":"Power system stability","author":"Kundur Prabha","year":"2007","unstructured":"Prabha Kundur. 2007. Power system stability. Power System Stability and Control, (3rd edition), (2007), 7\u20131.","journal-title":"Power System Stability and Control"},{"key":"e_1_3_1_62_2","volume-title":"Power System Analysis & Design, SI Version","author":"Glover J. Duncan","year":"2012","unstructured":"J. Duncan Glover, Mulukutla S. Sarma, and Thomas Overbye. 2012. Power System Analysis & Design, SI Version. Cengage Learning."},{"key":"e_1_3_1_63_2","unstructured":"PowerWorld. 2021. https:\/\/www.powerworld.com\/"},{"key":"e_1_3_1_64_2","first-page":"1115","volume-title":"28th USENIX Security Symposium (USENIX Security\u201919)","author":"Huang Bing","year":"2019","unstructured":"Bing Huang, Alvaro A. Cardenas, and Ross Baldick. 2019. Not everything is dark and gloomy: Power grid protections against IoT demand attacks. In 28th USENIX Security Symposium (USENIX Security\u201919). 1115\u20131132."},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3083696"},{"key":"e_1_3_1_66_2","unstructured":"ReCAPTCHA. 2021. https:\/\/www.google.com\/recaptcha\/about\/"},{"key":"e_1_3_1_67_2","unstructured":"Smartcar \u00b7 API platform for Connected Car Data. n.d.https:\/\/smartcar.com\/"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T12:06:23Z","timestamp":1697285183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,14]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,31]]}},"alternative-id":["10.1145\/3609508"],"URL":"http:\/\/dx.doi.org\/10.1145\/3609508","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,14]]},"assertion":[{"value":"2023-02-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}