Bogdan Groza

Orcid: 0000-0003-3078-3635

According to our database1, Bogdan Groza authored at least 84 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Control System Level Intrusion Detection on J1939 Heavy-Duty Vehicle Buses.
IEEE Trans. Ind. Informatics, February, 2024

2023
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers.
IEEE Internet Things J., August, 2023

Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023

Impact of Wiring Characteristics on Voltage-based Fingerprinting in Controller Area Networks.
Proceedings of the 17th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2023

Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks.
Proceedings of the 17th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2023

2022
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus.
IEEE Trans. Intell. Transp. Syst., 2022

ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles.
IEEE Trans. Inf. Forensics Secur., 2022

Smartphone Camera Identification from Low-Mid Frequency DCT Coefficients of Dark Images.
Entropy, 2022

Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022

Android Head Units vs. In-Vehicle ECUs: Performance Assessment for Deploying In-Vehicle Intrusion Detection Systems for the CAN Bus.
IEEE Access, 2022

PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition.
Proceedings of the IEEE International Conference on Automation, 2022

2021
Fast and Efficient Group Key Exchange in Controller Area Networks (CAN).
IEEE Trans. Veh. Technol., 2021

CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN.
IEEE Trans. Inf. Forensics Secur., 2021

Securing the controller area network with covert voltage channels.
Int. J. Inf. Sec., 2021

CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021

CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Efficient Physical Layer Key Agreement for FlexRay Networks.
IEEE Trans. Veh. Technol., 2020

Highly Efficient Authentication for CAN by Identifier Reallocation With Ordered CMACs.
IEEE Trans. Veh. Technol., 2020

A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring.
Sensors, 2020

TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network.
IEEE Access, 2020

Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport.
IEEE Access, 2020

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units.
IEEE Access, 2020

ANTARES - ANonymous Transfer of vehicle Access Rights from External cloud Services.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

2019
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay.
Sensors, 2019

TRICKS - Time TRIggered Covert Key Sharing for Controller Area Networks.
IEEE Access, 2019

Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study.
Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, 2019

Secure V2V Communication with Identity-based Cryptography from License Plate Recognition.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain.
Proceedings of the 23rd International Conference on System Theory, Control and Computing, 2019

Accommodating Time-Triggered Authentication to FlexRay Demands.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks.
IEEE Veh. Technol. Mag., 2018

Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol.
IEEE Trans. Veh. Technol., 2018

Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers.
Proceedings of the Computer Safety, Reliability, and Security, 2018

INCANTA - INtrusion Detection in Controller Area Networks with Time-Covert Authentication.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Risk Assessment and Security Countermeasures for Vehicular Instrument Clusters.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol.
Proceedings of the Risks and Security of Internet and Systems, 2018

A brief look at the security of DeviceNet communication in industrial control systems.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks.
ACM Trans. Embed. Comput. Syst., 2017

Traffic models with adversarial vehicle behaviour.
CoRR, 2017

An Experimental Model for In-vehicle Networks and Subsystems.
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017

Designing Wireless Automotive Keys with Rights Sharing Capabilities on the MSP430 Microcontroller.
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017

A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices.
Proceedings of the Risks and Security of Internet and Systems, 2017

DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered Viewpoint.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

LiMon - Lightweight Authentication for Tire Pressure Monitoring Sensors.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

2014
Source Identification Using Signal Characteristics in Controller Area Networks.
IEEE Signal Process. Lett., 2014

Cryptographic puzzles and DoS resilience, revisited.
Des. Codes Cryptogr., 2014

2013
Efficient Protocols for Secure Broadcast in Controller Area Networks.
IEEE Trans. Ind. Informatics, 2013

Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms.
Int. J. Secur. Softw. Eng., 2013

Secure Broadcast with One-Time Signatures in Controller Area Networks.
Int. J. Mob. Comput. Multim. Commun., 2013

Fingerprinting Smartphones Remotely via ICMP Timestamps.
IEEE Commun. Lett., 2013

Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam.
Proceedings of the 2012 International Conference on Privacy, 2012

SAPHE: simple accelerometer based wireless pairing with heuristic trees.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.
Proceedings of the Information Security - 15th International Conference, 2012

LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Higher Layer Authentication for Broadcast in Controller Area Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Augmenting a Webmail Application with Cryptographic Puzzles to Deflect Spam.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Broadcast Authentication in a Low Speed Controller Area Network.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Performance improvements for SHA-3 finalists by exploiting microcontroller on-chip parallelism.
Proceedings of the CRiSIS 2011, 2011

Formal modelling and automatic detection of resource exhaustion attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Some Security Issues in SCALANCE Wireless Industrial Networks.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Analysis of a Password Strengthening Technique and Its Practical Use.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A multidisciplinary project: How to turn a webcam into a secure-cam.
Proceedings of the 5th International Symposium on Applied Computational Intelligence and Informatics, 2009

A Calculus to Detect Guessing Attacks.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Broadcast Authentication with Practically Unbounded One-way Chains.
J. Softw., 2008

2007
An Extension of the RSA Trapdoor in a KEM/DEM Framework.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

Implementation of an Authentication Protocol for Sending Audio-Video Information in Java.
Proceedings of the 4th International Symposium on Applied Computational Intelligence and Informatics, 2007

On the use of one-way chain based authentication protocols in secure control systems.
Proceedings of the The Second International Conference on Availability, 2007

Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain.
Proceedings of the The Second International Conference on Availability, 2007

2006
Using One-Way Chains to Provide Message Authentication without Shared Secrets.
Proceedings of the Second International Workshop on Security, 2006

Neural Network Based Framework for Optimization of Enterprise Resource Planning.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Cryptanalysis of an Authentication Protocol.
Proceedings of the Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2005), 2005


  Loading...