Journals

ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses inside Cars and SAE J1939 Compliant Vehicles, IEEE Transactions on Information Forensics and Security, 2022. .pdf IEEE
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus, IEEE Transactions on Intelligent Transportation Systems, 2022. .pdf IEEE
Sweep-to-Unlock - Fingerprinting Smartphones based on Loudspeaker Roll-off Characteristics, IEEE Transactions on Mobile Computing, 2021. .pdf IEEE
CANTO - Covert AutheNtication with Timing channels over Optimized traffic flows for CAN, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 601-616, 2021. .pdf IEEE
Fast and Efficient Group Key Exchange in Controller Area Networks (CAN), IEEE Transactions on Vehicular Technology, vol. 70, pp. 9385-9399, 2021. .pdf IEEE
Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems, Applied Sciences, vol. 11, issue 19, 2021. .pdf MDPI
Securing the controller area network with covert voltage channels, International Journal of Information Security, accepted 2020. .pdf Springer
Highly Efficient Authentication for CAN by Identifier Reallocation with Ordered CMACs, IEEE Transactions on Vehicular Technology, vol. 69 , issue 6, pp. 6129-6140, 2020. .pdf IEEE
Efficient Physical Layer Key Agreement for FlexRay Networks, IEEE Transactions on Vehicular Technology, 14 pages, 2020. .pdf IEEE
PRESTvO: PRivacy Enabled Smartphone-based access To vehicle On-board units, IEEE Access, vol. 8, pp. 119105-119122, 2020. .pdf IEEE
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport, IEEE Access, vol. 8, pp. 9246-9259, 2020. .pdf IEEE
TIDAL-CAN: differential Timing based Intrusion Detection And Localization for Controller Area Network, IEEE Access, vol. 8, pp. 68895-68912, 2020. .pdf IEEE
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring, Sensors, 20(2), 19 pages, 2020. .pdf MDPI
Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay, Sensors, 19(22), 17 pages, 2019. .pdf MDPI
TRICKS - time TRIggered Covert Key Sharing for Controller Area Networks, IEEE Access, vol. 7, pp. 104294-104307, 2019. .pdf IEEE
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks, IEEE Transactions on Information Forensics and Security, vol. 14, issue 4, pp. 1037-1051, 2019. .pdf IEEE
Security shortcomings and countermeasures for the SAE J1939 commercial vehicle bus protocol, IEEE Transactions on Vehicular Technology, vol. 67, issue 5, pp. 4325-4339, 2018. .pdf IEEE
Security solutions for the CAN bus - bringing authentication to in-vehicle networks, IEEE Vehicular Technology Magazine, vol. 13, issue 1, pp. 40-47, 2018. .pdf IEEE
LiBrA-CAN: a Lightweight Broadcast Authentication protocol for Controller Area Networks, ACM Transactions on Embedded Computing Systems, vol. 16, no. 3, 28 pages, 2017. .pdf ACM
Client puzzles and DoS resilience, Revisited, Designs Codes and Cryptography, 73, pp. 177–207, Springer-Verlag, 2014. .pdf Springer
Source Identification Using Signal Characteristics in Controller Area Networks, IEEE Signal Processing Letters, vol. 21, issue 4, pp. 395-399, 2014. .pdf IEEE
Efficient protocols for secure broadcast in Controller Area Networks, IEEE Transactions on Industrial Informatics, vol. 9, issue 4, pp. 2034-2042, 2013. .pdf IEEE
Fingerprinting Smartphones Remotely via ICMP Timestamps, IEEE Communication Letters, vol. 17, issue 6, pp. 1081-1083, 2013. .pdf IEEE
Protocol vulnerabilities in practice: causes, modeling and automatic detection, Proceedings of the Romanian Academy, Series A, vol. 13, no. 2, pp. 167-174, 2012. .pdf ACAD
Experimenting with the secure control of a robot over TCP/IP, Automation, Computers, Applied Mathematics Journal (ACAM), vol. 17, no. 4, pp. 597-605, 2008. .pdf ACAM
On the security of some authentication mechanisms from Windows, Buletinul Stiintific al Universitatii Politehnica din Timisoara, Seria Automatica si Calculatoare, 8 pages, 2008. .pdf
Broadcast authentication with practically unbounded one-way chains, Journal of Software (JSW), vol. 3, no. 2, Academy Publishers, pp. 11-20, 2008. .pdf JSW
Construction techniques for one-way chains and their use in authentication, Control Engineering and Applied Informatics Journal (CEAI), vol. 8, no.1, pp. 42-51, 2006. .pdf
A time-memory trade to generate one-time passwords using quadratic residues over Zn, Studies in Informatics and Control (SIC), vol. 14, no. 3, 13 pages, 2005. .pdf

  Conferences

Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition, IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2022. .pdf
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs, 30th USENIX Security Symposium, 2021. .pdf USENIX
CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses, 26th European Symposium on Research in Computer Security (ESORICS), 2021. .pdf
ANTARES - ANonymous Transfer of vehicle Access Rights from External cloud Services, 3rd International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'20 (VTC'20 workshops), 5 pages, 2020. .pdf IEEE
Car-to-Smartphone Interactions: Experimental Setup, Risk Analysis and Security Technologies, 5th International Workshop on Critical Automotive Applications: Robustness & Safety, CARS'19 (EDCC'19 workshops), 4 pages, 2019. .pdf HAL
CarINA - Car sharing with IdeNtity based Access control re-enforced by TPM, 2nd International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'19 (SAFECOMP'19 workshops), LNCS, vol. 11699, pp. 210-222, Springer, 2019. .pdf Springer
Accommodating Time-Triggered Authentication to FlexRay Demands, 3rd Central European Cybersecurity Conference, CECC'19, 6 pages, ACM, 2019. .pdf ACM
Integrating Adversary Models and Intrusion Detection Systems for In-Vehicle Networks in CANoe, 12th International Conference on Security for Information Technology and Communications, SECITC'19, LNCS, vol. 12001, pp. 241-256, Springer, 2019. .pdf Springer
Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers, 1st Workshop on Industrial Security and IoT, WISI'19 (ARES'19 workshops), 7 pages, ACM, 2019. .pdf ACM
Security for low-end automotive sensors: a tire-pressure and rain-light sensors case study, 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS'19, 9 pages, SCITEPRESS, 2019. .pdf SCITEPRESS
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition, 2nd International Workshop on Intelligent Transportation and Connected Vehicles Technologies, ITCVT'19, pp. 366-373, IEEE, 2019. .pdf IEEE
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain, 23rd International Conference on System Theory, Control and Computing, ICSTCC'19, pp. 560-565, IEEE, 2019. .pdf IEEE
Air pollution monitoring with secure low-cost Vehicular Sensor Networks, 1st International Conference on Computational Methods and Applications in Engineering, ICCMAE'18, 5 pages, 2019.
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks, 11th International Conference on Innovative Security Solutions for Information Technology and Communications, SECITC'18, LNCS, vol. 11359, pp. 109-125, Springer, 2018. .pdf Springer
Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers, 1st International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, STRIVE'18 (SAFECOMP'18 workshops), LNCS, vol. 11094, pp. 331-343, Springer, 2018. .pdf Springer
A brief look at the security of DeviceNet communication in industrial control systems, 2nd Central European Cybersecurity Conference, CECC'18, 6 pages, ACM, 2018. .pdf ACM
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol, 13th International Conference on Risks and Security of Internet and Systems, CRiSIS'18, LNCS, vol. 11391, pp. 172-187, Springer, 2018. .pdf Springer
INCANTA - Intrusion detection in Controller Area Networks with Time-covert Cryptographic Authentication, 1st International Workshop on Cyber Security for Intelligent Transportation Systems, CSITS'18 (ESORICS'18 Workshops), LNCS, vol. 11552, pp. 94-110, Springer, 2018. .pdf Springer
Risk assessment and security countermeasures for vehicular instrument clusters, 4th International Workshop on Safety and Security of Intelligent Vehicles, SSIV'18 (DSN'18 workshops), pp. 223-230, IEEE, 2018. .pdf IEEE
A Vehicle Collision-Warning System based on Multipeer Connectivity and Off-the-shelf Smart-Devices, 12th International Conference on Risks and Security of Internet and Systems, CRiSIS'17, LNCS, vol. 10694, pp. 115-123, Springer, 2017. .pdf Springer
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer, 12th International Conference on Availability, Reliability and Security, ARES'17, 10 pages, ACM, 2017. .pdf ACM
Designing wireless automotive keys with rights sharing capabilities on the Texas Instruments MSP430 microcontroller, 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS'17, pp. 173-180, SCITEPRESS, 2017. .pdf SCITEPRESS
An experimental model for in-vehicle networks and subsystems, 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS'17, pp. 326-331, SCITEPRESS, 2017. .pdf SCITEPRESS
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers, 13th International Conference on Security and Cryptography, SECRYPT'16, pp. 109–120, ACM, 2016. .pdf ACM
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers, 11th International Conference on Availability, Reliability and Security, ARES'16, pp. 117-126, IEEE, 2016. .pdf IEEE
Designing security for in-vehicle networks: a Body Control Module (BCM) centered viewpoint, 2nd International Workshop on Safety and Security of Intelligent Vehicles, SSIV'16 (DSN'16 workshops), pp. 176-183, IEEE, 2016. .pdf IEEE
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay, 10th International Workshop on Embedded Systems Security, WESS'15 (ESWEEK'15 workshop), 8 pages, ACM, 2015. .pdf ACM
LiMon - lightweight authentication for tire pressure monitoring sensors, 1st Workshop on the Security of Cyber-Physical Systems, WOS-CPS'15 (ESORICS'15 workshop), LNCS, vol. 9588, pp. 95-111, Springer, 2015. .pdf Springer
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels, 8th International Conference on Critical Information Infrastructures Security, CRITIS'13, LNCS, vol. 8328, pp. 167-178, Springer, 2013. .pdf Springer
LiBrA-CAN: a Lightweight Broadcast Authentication protocol for Controller Area Networks, 11th International Conference on Cryptology and Network Security, CANS'12, LNCS, vol. 7712, pp. 185-200, Springer, 2012. .pdf IEEE
SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees, 10th International Conference on Advances in Mobile Computing and Multimedia, MoMM'12, pp. 161–168, ACM, 2012. .pdf ACM
Revisiting difficulty notions for client puzzles and DoS resilience, 15th International Conference on Information Security Conference, ISC'12, Springer-Verlag, LNCS vol. 7483, pp. 39-54, 2012. .pdf IEEE
Provable Synthetic Coordinates for Increasing PoWs Effectiveness Against DoS and Spam, International Conference on Privacy, Security, Risk and Trust, PASSAT/SocialCom'12, pp. 809-810, IEEE, 2012. .pdf IEEE
Performance improvements for SHA-3 finalists by exploiting microcontroller on-chip parallelism, 6th International Conference on Risks and Security of Internet and Systems, CRiSIS'11, 7 pages, IEEE, 2011. .pdf IEEE
Some Security Issues In SCALANCE Wireless Industrial Networks, 6th International Conference on Availability, Reliability and Security, ARES'11, pp. 493-498, IEEE, 2011. .pdf IEEE
Secure Broadcast with One-time Signatures in Controller Area Networks, 6th International Conference on Availability, Reliability and Security, ARES'11, pp. 493-498, IEEE, 2011. .pdf IEEE
Broadcast Authentication in a Low Speed Controller Area Network, 8th International Conference on Security and Cryptography, SECRYPT'11, pp. 330-344, Springer, 2011. .pdf Springer
Formal modelling and automatic detection of resource exhaustion attacks, 6th ACM ASIA Symposium on Information, Computer and Communications Security, ASIACCS'11, pp. 326–333, ACM, 2011. .pdf ACM
Augmenting a webmail application with cryptographic puzzles to deflect spam, 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS'11, pp. 1-5, IEEE, 2011. .pdf IEEE
Customizing protocol specifications for detecting resource exhaustion and guessing attacks, Formal Methods for Components and Objects, FMCO'10, LNCS, vol. 6957, pp. 45-60, Springer, 2010. .pdf Springer
A formal approach for automatic detection of off-line and undetectable on-line guessing, 14th International Conference on Financial Cryptography and Data Security, FC'10, LNCS, vol. 6052, pp. 391-399, Springer, 2010. .pdf Springer
A calculus to detect guessing attacks, 12th International Information Security Conference, ISC'09, Springer, LNCS, vol. 5735, pp. 59-67, 2009. .pdf Springer
Analysis of a Password Strengthening Technique and Its Practical Use, 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE'09, pp.292-297, IEEE, 2009. .pdf IEEE
Towards Developing Secure Video Surveillance Systems over IP, 4th International Conference on Internet Monitoring and Protection, ICIMP'09, pp. 27-33, IEEE, 2009. .pdf IEEE
A Multidisciplinary Project: How to Turn a Webcam into a Secure-Cam, 5th International Symposium on Applied Computational Intelligence and Informatics, SACI'09, pp. 381-386, IEEE, 2009. .pdf IEEE
Cryptographic authentication on a 8051 based development board, 3rd International Conference on Internet Monitoring and Protection, ICIMP'08, pp. 92-97, IEEE, 2008. .pdf IEEE
Using a Cryptographic Authentication Protocol for the Secure Control of a Robot over TCP/IP, 16th IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR'08, pp. 184-189, IEEE, 2008. .pdf IEEE
Java Implementation of an Authentication Protocol with Application on Mobile Phones, 16th IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR'08, pp. 190-194, IEEE, 2008. .pdf IEEE
An overview of NTLM authentication and its Weaknesses in SharePoint Solutions, 8th International Conference on Technical Informatics, CONTI'08, 2008.
Development of a client-server platform for simulation of remote control systems, National Conference on Electrical Drives, CNAE'08, 3 pages, 2008.
Broadcast authentication protocol with time synchronization and quadratic residues chains, 2nd International Conference on Availability, Reliability and Security, ARES'07, pp. 550-557, IEEE, 2007. .pdf IEEE
On the use of one-way chain based authentication in secure control systems, 2nd International Conference on Availability, Reliability and Security, ARES’07, pp. 1214-1221, IEEE, 2007. .pdf IEEE
An extension of the RSA trapdoor in a KEM/DEM Framework, 9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC'07, pp. 182-187, IEEE, 2007. .pdf IEEE
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java, 4th International Symposium on Applied Computational Intelligence and Informatics, SACI'07, pp. 237-240, IEEE, 2007. .pdf IEEE
On the use of the discrete power function for building public-key cryptosystems, 7th WSEAS International Conference on Applied Informatics and Communications, pp. 7-11, 2007.
Using one-way chains to provide message authentication without shared secrets, 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPeru'06, pp. 82-87, IEEE, 2006. .pdf IEEE
Using the Discrete Squaring Function in the Delayed Message Authentication Protocol, International Conference on Internet Surveillance and Protection, ICISP’06, pp. 25-25, IEEE, 2006.
On chained cryptographic puzzles, 3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence, SACI'06, pp. 182-191, IEEE, 2006. .pdf
The Delayed Message Authentication Protocol with Chains Constructed On the Discrete Power Function, 7th International Conference on Technical Informatics, CONTI'06, pp. 33-36, 2006.
Cryptanalysis of an Authentication Protocol, 7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC'05, pp. 147-153, IEEE, 2005. .pdf IEEE
Security based on cryptographic techniques for remote control systems, 12th International Symposium on System Theory, SINTES'12, pp. 729-734, 2005. .pdf
One-time passwords for uncertain number of authentications, 15th International Conference on control systems and computer science, CSCS15, pp. 669-674, 2005. .pdf