Journals
Cyberattacks on Adaptive Cruise Controls and Emergency Braking Systems: Adversary Models, Impact Assessment and Countermeasures,
IEEE Transactions on Reliability, 2024.
.pdf
A Survey on Fingerprinting Technologies for Smartphones based on Embedded Transducers,
IEEE Internet of Things Journal (IoT), 2023.
.pdf
Control System Level Intrusion Detection on J1939 Heavy-Duty Vehicle Buses,
IEEE Transactions on Industrial Informatics, 2023.
.pdf
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals,
IEEE Transactions on Information Forensics and Security, 2023.
.pdf
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings
IEEE Access, 2022.
.pdf
Android Head Units vs. In-Vehicle ECUs: Performance Assessment for Deploying In-Vehicle Intrusion Detection Systems for the CAN Bus,
IEEE Access, 2022.
.pdf
CarTwin - Development of a Digital Twin for a Real-World In-Vehicle CAN Network,
Applied Sciences, 2022.
.pdf
Smartphone Camera Identification from Low-Mid Frequency DCT Coefficients of Dark Images,
Entropy, 2022.
.pdf
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses inside Cars and SAE J1939 Compliant Vehicles,
IEEE Transactions on Information Forensics and Security, 2022.
.pdf
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus,
IEEE Transactions on Intelligent Transportation Systems, 2022.
.pdf
Sweep-to-Unlock - Fingerprinting Smartphones based on Loudspeaker Roll-off Characteristics,
IEEE Transactions on Mobile Computing, 2021.
.pdf
CANTO - Covert AutheNtication with Timing channels over Optimized traffic flows for CAN,
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 601-616, 2021.
.pdf
Fast and Efficient Group Key Exchange in Controller Area Networks (CAN),
IEEE Transactions on Vehicular Technology, vol. 70, pp. 9385-9399, 2021.
.pdf
Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems,
Applied Sciences, vol. 11, issue 19, 2021.
.pdf
Securing the controller area network with covert voltage channels,
International Journal of Information Security, accepted 2020.
.pdf
Highly Efficient Authentication for CAN by Identifier Reallocation with Ordered CMACs,
IEEE Transactions on Vehicular Technology, vol. 69 , issue 6, pp. 6129-6140, 2020.
.pdf
Efficient Physical Layer Key Agreement for FlexRay Networks,
IEEE Transactions on Vehicular Technology, 14 pages, 2020.
.pdf
PRESTvO: PRivacy Enabled Smartphone-based access To vehicle On-board units,
IEEE Access, vol. 8, pp. 119105-119122, 2020.
.pdf
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport,
IEEE Access, vol. 8, pp. 9246-9259, 2020.
.pdf
TIDAL-CAN: differential Timing based Intrusion Detection And Localization for Controller Area Network,
IEEE Access, vol. 8, pp. 68895-68912, 2020.
.pdf
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring,
Sensors, 20(2), 19 pages, 2020.
.pdf
Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay,
Sensors, 19(22), 17 pages, 2019.
.pdf
TRICKS - time TRIggered Covert Key Sharing for Controller Area Networks,
IEEE Access, vol. 7, pp. 104294-104307, 2019.
.pdf
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks,
IEEE Transactions on Information Forensics and Security, vol. 14, issue 4, pp. 1037-1051, 2019.
.pdf
Security shortcomings and countermeasures for the SAE J1939 commercial vehicle bus protocol,
IEEE Transactions on Vehicular Technology, vol. 67, issue 5, pp. 4325-4339, 2018.
.pdf
Security solutions for the CAN bus - bringing authentication to in-vehicle networks,
IEEE Vehicular Technology Magazine, vol. 13, issue 1, pp. 40-47, 2018.
.pdf
LiBrA-CAN: a Lightweight Broadcast Authentication protocol for Controller Area Networks,
ACM Transactions on Embedded Computing Systems, vol. 16, no. 3, 28 pages, 2017.
.pdf
Client puzzles and DoS resilience, Revisited,
Designs Codes and Cryptography, 73, pp. 177–207, Springer-Verlag, 2014.
.pdf
Source Identification Using Signal Characteristics in Controller Area Networks,
IEEE Signal Processing Letters, vol. 21, issue 4, pp. 395-399, 2014.
.pdf
Efficient protocols for secure broadcast in Controller Area Networks,
IEEE Transactions on Industrial Informatics, vol. 9, issue 4, pp. 2034-2042, 2013.
.pdf
Fingerprinting Smartphones Remotely via ICMP Timestamps,
IEEE Communication Letters, vol. 17, issue 6, pp. 1081-1083, 2013.
.pdf
Protocol vulnerabilities in practice: causes, modeling and automatic detection,
Proceedings of the Romanian Academy, Series A, vol. 13, no. 2, pp. 167-174, 2012.
.pdf
Experimenting with the secure control of a robot over TCP/IP,
Automation, Computers, Applied Mathematics Journal (ACAM), vol. 17, no. 4, pp. 597-605, 2008.
.pdf
On the security of some authentication mechanisms from Windows,
Buletinul Stiintific al Universitatii Politehnica din Timisoara, Seria Automatica si Calculatoare, 8 pages, 2008.
.pdf
Broadcast authentication with practically unbounded one-way chains,
Journal of Software (JSW), vol. 3, no. 2, Academy Publishers, pp. 11-20, 2008.
.pdf
Construction techniques for one-way chains and their use in authentication,
Control Engineering and Applied Informatics Journal (CEAI), vol. 8, no.1, pp. 42-51, 2006.
.pdf
A time-memory trade to generate one-time passwords using quadratic residues over Zn,
Studies in Informatics and Control (SIC), vol. 14, no. 3, 13 pages, 2005.
.pdf
  Conferences
Wiring Impact on Voltage Fingerprints in Controller Area Networks,
17th International Symposium on Applied Computational Intelligence and Informatics, 2023.
.pdf
Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks,
17th International Symposium on Applied Computational Intelligence and Informatics, 2023.
.pdf
PanoptiCANs-Adversary-Resilient Architectures for Controller Area Networks,
27th European Symposium on Research in Computer Security, 2022.
.pdf
Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition,
IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2022.
.pdf
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs,
30th USENIX Security Symposium, 2021.
.pdf
CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses,
26th European Symposium on Research in Computer Security (ESORICS), 2021.
.pdf
ANTARES - ANonymous Transfer of vehicle Access Rights from External cloud Services,
3rd International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'20 (VTC'20 workshops), 5 pages, 2020.
.pdf
Car-to-Smartphone Interactions: Experimental Setup, Risk Analysis and Security Technologies,
5th International Workshop on Critical Automotive Applications: Robustness & Safety, CARS'19 (EDCC'19 workshops), 4 pages, 2019.
.pdf
CarINA - Car sharing with IdeNtity based Access control re-enforced by TPM,
2nd International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'19 (SAFECOMP'19 workshops), LNCS, vol. 11699, pp. 210-222, Springer, 2019.
.pdf
Accommodating Time-Triggered Authentication to FlexRay Demands,
3rd Central European Cybersecurity Conference, CECC'19, 6 pages, ACM, 2019.
.pdf
Integrating Adversary Models and Intrusion Detection Systems for In-Vehicle Networks in CANoe,
12th International Conference on Security for Information Technology and Communications, SECITC'19, LNCS, vol. 12001, pp. 241-256, Springer, 2019.
.pdf
Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers,
1st Workshop on Industrial Security and IoT, WISI'19 (ARES'19 workshops), 7 pages, ACM, 2019.
.pdf
Security for low-end automotive sensors: a tire-pressure and rain-light sensors case study,
9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS'19, 9 pages, SCITEPRESS, 2019.
.pdf
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition,
2nd International Workshop on Intelligent Transportation and Connected Vehicles Technologies, ITCVT'19, pp. 366-373, IEEE, 2019.
.pdf
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain,
23rd International Conference on System Theory, Control and Computing, ICSTCC'19, pp. 560-565, IEEE, 2019.
.pdf
Air pollution monitoring with secure low-cost Vehicular Sensor Networks,
1st International Conference on Computational Methods and Applications in Engineering, ICCMAE'18, 5 pages, 2019.
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks,
11th International Conference on Innovative Security Solutions for Information Technology and Communications, SECITC'18, LNCS, vol. 11359, pp. 109-125, Springer, 2018.
.pdf
Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers,
1st International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'18 (SAFECOMP'18 workshops), LNCS, vol. 11094, pp. 331-343, Springer, 2018.
.pdf
A brief look at the security of DeviceNet communication in industrial control systems,
2nd Central European Cybersecurity Conference, CECC'18, 6 pages, ACM, 2018.
.pdf
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol,
13th International Conference on Risks and Security of Internet and Systems, CRiSIS'18, LNCS, vol. 11391, pp. 172-187, Springer, 2018.
.pdf
INCANTA - Intrusion detection in Controller Area Networks with Time-covert Cryptographic Authentication,
1st International Workshop on Cyber Security for Intelligent Transportation Systems, CSITS'18 (ESORICS'18 Workshops), LNCS, vol. 11552, pp. 94-110, Springer, 2018.
.pdf
Risk assessment and security countermeasures for vehicular instrument clusters,
4th International Workshop on Safety and Security of Intelligent Vehicles, SSIV'18 (DSN'18 workshops), pp. 223-230, IEEE, 2018.
.pdf
A Vehicle Collision-Warning System based on Multipeer Connectivity and Off-the-shelf Smart-Devices,
12th International Conference on Risks and Security of Internet and Systems, CRiSIS'17, LNCS, vol. 10694, pp. 115-123, Springer, 2017.
.pdf
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer,
12th International Conference on Availability, Reliability and Security, ARES'17, 10 pages, ACM, 2017.
.pdf
Designing wireless automotive keys with rights sharing capabilities on the Texas Instruments MSP430 microcontroller,
3rd International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS'17, pp. 173-180, SCITEPRESS, 2017.
.pdf
An experimental model for in-vehicle networks and subsystems,
3rd International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS'17, pp. 326-331, SCITEPRESS, 2017.
.pdf
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers,
13th International Conference on Security and Cryptography, SECRYPT'16, pp. 109–120, ACM, 2016.
.pdf
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers,
11th International Conference on Availability, Reliability and Security, ARES'16, pp. 117-126, IEEE, 2016.
.pdf
Designing security for in-vehicle networks: a Body Control Module (BCM) centered viewpoint,
2nd International Workshop on Safety and Security of Intelligent Vehicles, SSIV'16 (DSN'16 workshops), pp. 176-183, IEEE, 2016.
.pdf
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay,
10th International Workshop on Embedded Systems Security, WESS'15 (ESWEEK'15 workshop), 8 pages, ACM, 2015.
.pdf
LiMon - lightweight authentication for tire pressure monitoring sensors,
1st Workshop on the Security of Cyber-Physical Systems, WOS-CPS'15 (ESORICS'15 workshop), LNCS, vol. 9588, pp. 95-111, Springer, 2015.
.pdf
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels,
8th International Conference on Critical Information Infrastructures Security, CRITIS'13, LNCS, vol. 8328, pp. 167-178, Springer, 2013.
.pdf
LiBrA-CAN: a Lightweight Broadcast Authentication protocol for Controller Area Networks,
11th International Conference on Cryptology and Network Security, CANS'12, LNCS, vol. 7712, pp. 185-200, Springer, 2012.
.pdf
SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees,
10th International Conference on Advances in Mobile Computing and Multimedia, MoMM'12, pp. 161–168, ACM, 2012.
.pdf
Revisiting difficulty notions for client puzzles and DoS resilience,
15th International Conference on Information Security Conference, ISC'12, Springer-Verlag, LNCS vol. 7483, pp. 39-54, 2012.
.pdf
Provable Synthetic Coordinates for Increasing PoWs Effectiveness Against DoS and Spam,
International Conference on Privacy, Security, Risk and Trust, PASSAT/SocialCom'12, pp. 809-810, IEEE, 2012.
.pdf
Performance improvements for SHA-3 finalists by exploiting microcontroller on-chip parallelism,
6th International Conference on Risks and Security of Internet and Systems, CRiSIS'11, 7 pages, IEEE, 2011.
.pdf
Some Security Issues In SCALANCE Wireless Industrial Networks,
6th International Conference on Availability, Reliability and Security, ARES'11, pp. 493-498, IEEE, 2011.
.pdf
Secure Broadcast with One-time Signatures in Controller Area Networks,
6th International Conference on Availability, Reliability and Security, ARES'11, pp. 493-498, IEEE, 2011.
.pdf
Broadcast Authentication in a Low Speed Controller Area Network,
8th International Conference on Security and Cryptography, SECRYPT'11, pp. 330-344, Springer, 2011.
.pdf
Formal modelling and automatic detection of resource exhaustion attacks,
6th ACM ASIA Symposium on Information, Computer and Communications Security, ASIACCS'11, pp. 326–333, ACM, 2011.
.pdf
Augmenting a webmail application with cryptographic puzzles to deflect spam,
4th IFIP International Conference on New Technologies, Mobility and Security, NTMS'11, pp. 1-5, IEEE, 2011.
.pdf
Customizing protocol specifications for detecting resource exhaustion and guessing attacks,
Formal Methods for Components and Objects, FMCO'10, LNCS, vol. 6957, pp. 45-60, Springer, 2010.
.pdf
A formal approach for automatic detection of off-line and undetectable on-line guessing,
14th International Conference on Financial Cryptography and Data Security, FC'10, LNCS, vol. 6052, pp. 391-399, Springer, 2010.
.pdf
A calculus to detect guessing attacks,
12th International Information Security Conference, ISC'09, Springer, LNCS, vol. 5735, pp. 59-67, 2009.
.pdf
Analysis of a Password Strengthening Technique and Its Practical Use,
3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE'09, pp.292-297, IEEE, 2009.
.pdf
Towards Developing Secure Video Surveillance Systems over IP,
4th International Conference on Internet Monitoring and Protection, ICIMP'09, pp. 27-33, IEEE, 2009.
.pdf
A Multidisciplinary Project: How to Turn a Webcam into a Secure-Cam,
5th International Symposium on Applied Computational Intelligence and Informatics, SACI'09, pp. 381-386, IEEE, 2009.
.pdf
Cryptographic authentication on a 8051 based development board,
3rd International Conference on Internet Monitoring and Protection, ICIMP'08, pp. 92-97, IEEE, 2008.
.pdf
Using a Cryptographic Authentication Protocol for the Secure Control of a Robot over TCP/IP,
16th IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR'08, pp. 184-189, IEEE, 2008.
.pdf
Java Implementation of an Authentication Protocol with Application on Mobile Phones,
16th IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR'08, pp. 190-194, IEEE, 2008.
.pdf
An overview of NTLM authentication and its Weaknesses in SharePoint Solutions,
8th International Conference on Technical Informatics, CONTI'08, 2008.
Development of a client-server platform for simulation of remote control systems,
National Conference on Electrical Drives, CNAE'08, 3 pages, 2008.
Broadcast authentication protocol with time synchronization and quadratic residues chains,
2nd International Conference on Availability, Reliability and Security, ARES'07, pp. 550-557, IEEE, 2007.
.pdf
On the use of one-way chain based authentication in secure control systems,
2nd International Conference on Availability, Reliability and Security, ARES’07, pp. 1214-1221, IEEE, 2007.
.pdf
An extension of the RSA trapdoor in a KEM/DEM Framework,
9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC'07, pp. 182-187, IEEE, 2007.
.pdf
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java,
4th International Symposium on Applied Computational Intelligence and Informatics, SACI'07, pp. 237-240, IEEE, 2007.
.pdf
On the use of the discrete power function for building public-key cryptosystems,
7th WSEAS International Conference on Applied Informatics and Communications, pp. 7-11, 2007.
Using one-way chains to provide message authentication without shared secrets,
2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPeru'06, pp. 82-87, IEEE, 2006.
.pdf
Using the Discrete Squaring Function in the Delayed Message Authentication Protocol,
International Conference on Internet Surveillance and Protection, ICISP’06, pp. 25-25, IEEE, 2006.
On chained cryptographic puzzles,
3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence, SACI'06, pp. 182-191, IEEE, 2006.
.pdf
The Delayed Message Authentication Protocol with Chains Constructed On the Discrete Power Function,
7th International Conference on Technical Informatics, CONTI'06, pp. 33-36, 2006.
Cryptanalysis of an Authentication Protocol,
7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC'05, pp. 147-153, IEEE, 2005.
.pdf
Security based on cryptographic techniques for remote control systems,
12th International Symposium on System Theory, SINTES'12, pp. 729-734, 2005.
.pdf
One-time passwords for uncertain number of authentications,
15th International Conference on control systems and computer science, CSCS15, pp. 669-674, 2005.
.pdf
  Book Chapters
Secure by Design Autonomous Emergency Braking Systems in Accordance with ISO 21434,
In: Kukkala, V.K., Pasricha, S. (eds) Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems. Springer, Cham.
.pdf
Physical Layer Intrusion Detection and Localization on CAN bus,
In: Kukkala, V.K., Pasricha, S. (eds) Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems. Springer, Cham.
.pdf