-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathold-references.bib
More file actions
891 lines (825 loc) · 86.2 KB
/
old-references.bib
File metadata and controls
891 lines (825 loc) · 86.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
@article{johnson_review_2022,
title = {Review of {Electric} {Vehicle} {Charger} {Cybersecurity} {Vulnerabilities}, {Potential} {Impacts}, and {Defenses}},
volume = {15},
copyright = {http://creativecommons.org/licenses/by/3.0/},
issn = {1996-1073},
url = {https://www.mdpi.com/1996-1073/15/11/3931},
doi = {10.3390/en15113931},
abstract = {Worldwide growth in electric vehicle use is prompting new installations of private and public electric vehicle supply equipment (EVSE). EVSE devices support the electrification of the transportation industry but also represent a linchpin for power systems and transportation infrastructures. Cybersecurity researchers have recently identified several vulnerabilities that exist in EVSE devices, communications to electric vehicles (EVs), and upstream services, such as EVSE vendor cloud services, third party systems, and grid operators. The potential impact of attacks on these systems stretches from localized, relatively minor effects to long-term national disruptions. Fortunately, there is a strong and expanding collection of information technology (IT) and operational technology (OT) cybersecurity best practices that may be applied to the EVSE environment to secure this equipment. In this paper, we survey publicly disclosed EVSE vulnerabilities, the impact of EV charger cyberattacks, and proposed security protections for EV charging technologies.},
number = {11},
urldate = {2024-02-26},
journal = {Energies},
author = {Johnson, Jay and Berg, Timothy and Anderson, Benjamin and Wright, Brian},
month = jan,
year = {2022},
note = {Number: 11
Publisher: Multidisciplinary Digital Publishing Institute},
keywords = {cybersecurity, electric vehicle (EV), electric vehicle supply equipment (EVSE), EV chargers, power system security},
pages = {3931},
file = {Full Text PDF:/home/jakob/Zotero/storage/R6FJXIQ9/Johnson et al. - 2022 - Review of Electric Vehicle Charger Cybersecurity V.pdf:application/pdf},
}
@inproceedings{mahrukh_load_2023,
title = {Load {Altering} {Attacks}- a {Review} of {Impact} and {Mitigation} {Strategies}},
url = {https://ieeexplore.ieee.org/document/10150456},
doi = {10.1109/REEDCON57544.2023.10150456},
abstract = {Power Systems are the backbone of the economic activities and security of modern-day society. Simultaneously the size and complexity of the systems go on increasing at a rapid pace as the requirement for continuous and reliable power supply increases. With the ongoing modernization leading from the large-scale integration of operation and information technologies (OT and IT), power systems are becoming smarter and simultaneously prone to cyberattacks and their frequency of occurrence is on the rise. Malicious cyberattacks on the power system impose huge societal risks. Timely mitigation of these attacks thus becoming a necessity for reliably operating the power system. Load Altering Attacks (LAAs) are an important category of cyberattacks in power systems that tend to increase load abruptly with the motive of damaging the system and causing various losses to the whole society. This work gives a thorough review of load altering attacks, the various types, that can be launched against a power system, and then their mitigation techniques presented in various works of literature.},
urldate = {2024-02-26},
booktitle = {2023 {International} {Conference} on {Recent} {Advances} in {Electrical}, {Electronics} \& {Digital} {Healthcare} {Technologies} ({REEDCON})},
author = {Mahrukh, Mahrukh and Thomas, Mini Shaji},
month = may,
year = {2023},
keywords = {Cyberattacks, DLAAs, Economics, Electronic healthcare, Large scale integration, Load Altering Attacks, Mitigation, Optimization Techniques, Power supplies, Power system reliability, Power systems, Reliability, S-LAAs},
pages = {397--402},
file = {IEEE Xplore Abstract Record:/home/jakob/Zotero/storage/HQ8YA6BN/10150456.html:text/html;IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/9XSKSH6W/Mahrukh and Thomas - 2023 - Load Altering Attacks- a Review of Impact and Miti.pdf:application/pdf},
}
@article{nasr_power_2022,
title = {Power jacking your station: {In}-depth security analysis of electric vehicle charging station management systems},
volume = {112},
issn = {0167-4048},
shorttitle = {Power jacking your station},
url = {https://www.sciencedirect.com/science/article/pii/S0167404821003357},
doi = {10.1016/j.cose.2021.102511},
abstract = {The demand for Electric Vehicles (EVs) has been exponentially increasing, and to achieve sustainable growth, the industry dictated rapid development of the supporting infrastructure. This requires building a reliable EV charging ecosystem that serves customer demands while ensuring the security of the Internet-enabled systems and the connected critical infrastructure against possible cyber attacks. To this end, we devise a system lookup and collection approach to obtain a representative sample of widely deployed EV Charging Station Management Systems (EVCSMS). Furthermore, we leverage reverse engineering and penetration testing techniques to perform a first-of-a-kind comprehensive security and vulnerability analysis of the identified EVCSMS and their software/firmware implementations. Indeed, our systematic analysis unveils an array of vulnerabilities, which demonstrate the insecurity of the EVCSMS against remote cyber attacks. Considering the feasibility of such attacks, we discuss attack implications against the EV charging stations (EVCS) and their users. More importantly, we simulate the impact of practical cyber attack scenarios against the power grid, which result in possible service disruption and failure in the grid. Finally, while we recommend mitigation measures, our discoveries raise concerns about the lack of adequate security considerations in the design of the deployed EVCS, which will motivate vendors to take immediate action to patch their developed systems. Indeed, our communication with the concerned parties resulted in positive responses from some vendors such as Schneider Electric, who acknowledged our findings by reserving 12 CVEs, respectively.},
urldate = {2024-02-26},
journal = {Computers \& Security},
author = {Nasr, Tony and Torabi, Sadegh and Bou-Harb, Elias and Fachkha, Claude and Assi, Chadi},
month = jan,
year = {2022},
keywords = {Electric Vehicle (EV), EV Charging Station Management System, Security analysis, Zero-day vulnerabilities},
pages = {102511},
file = {Nasr et al. - 2022 - Power jacking your station In-depth security anal.pdf:/home/jakob/Zotero/storage/D66FFEI3/Nasr et al. - 2022 - Power jacking your station In-depth security anal.pdf:application/pdf},
}
@inproceedings{sanghvi_cybersecurity_2021,
address = {Chicago, IL, USA},
title = {Cybersecurity for {Electric} {Vehicle} {Fast}-{Charging} {Infrastructure}},
isbn = {978-1-72817-583-6},
url = {https://ieeexplore.ieee.org/document/9490069/},
doi = {10.1109/ITEC51675.2021.9490069},
abstract = {The integration of electric vehicles (EV s) into electric grid operations can potentially leave the grid vulnerable to cyberattacks from both legacy and new equipment and protocols, including extreme fast-charging infrastructure. This paper introduces a co-simulation platform to perform cyber vulnerability analysis of EV charging infrastructure and its dependencies on communications and control systems. Grid impact scenarios through linkages to power system simulation tools such as OpenDSS and vehicle infrastructure-specific attack paths are discussed. An adaptive platform that assists with predicting and solving evolving cybersecurity challenges is demonstrated with a cyber-energy emulation that accelerates the analysis of cyberattacks and system behavior.},
urldate = {2024-03-04},
booktitle = {2021 {IEEE} {Transportation} {Electrification} {Conference} \& {Expo} ({ITEC})},
publisher = {IEEE},
author = {Sanghvi, Anuj and Markel, Tony},
month = jun,
year = {2021},
pages = {573--576},
file = {Sanghvi and Markel - 2021 - Cybersecurity for Electric Vehicle Fast-Charging I.pdf:/home/jakob/Zotero/storage/VL2L8QR8/Sanghvi and Markel - 2021 - Cybersecurity for Electric Vehicle Fast-Charging I.pdf:application/pdf},
}
@inproceedings{park_potential_2019,
address = {Knoxville, TN, USA},
title = {Potential {Cybersecurity} {Issues} of {Fast} {Charging} {Stations} with {Quantitative} {Severity} {Analysis}},
isbn = {978-1-72812-925-9},
url = {https://ieeexplore.ieee.org/document/8925069/},
doi = {10.1109/CyberPELS.2019.8925069},
abstract = {Potential issues of front-end converters of wireless power transfer system modules for extreme fast charging are discussed and analyzed in this study in order to provide some recommendations to defend against attacks on electric vehicles and charging systems. Compared to conventional low-power charging systems, the impact of a cyber-attack might be more detrimental in high-power / fast charging systems since the fault energy levels would be inherently higher both on the grid- and vehicle- side converters. In order to analyze the potential issues that might be a result of cyber-attacks, the negative scenarios are reviewed in this study which include interfering with the grid-side controllers, establishing fake communications between the vehicles and the charging stations, and interfering with the battery management system functionalities. A 100-kW stationary wireless power transfer system with a series-series resonant compensation network is used as a representative system in the analysis. Potential damages and the fault energy levels for selected fault scenarios are investigated. The system is simulated to verify the analysis results. On the basis of the discussed worst-case study, a set of hardware design-level solutions are recommended in this study to provide cyber protection.},
urldate = {2024-03-04},
booktitle = {2019 {IEEE} {CyberPELS} ({CyberPELS})},
publisher = {IEEE},
author = {Park, Yongwan and Onar, Omer C. and Ozpineci, Burak},
month = apr,
year = {2019},
pages = {1--7},
file = {Park et al. - 2019 - Potential Cybersecurity Issues of Fast Charging St.pdf:/home/jakob/Zotero/storage/BQLGEPDK/Park et al. - 2019 - Potential Cybersecurity Issues of Fast Charging St.pdf:application/pdf},
}
@article{deb_review_2021,
title = {A {Review} of {Extremely} {Fast} {Charging} {Stations} for {Electric} {Vehicles}},
volume = {14},
copyright = {http://creativecommons.org/licenses/by/3.0/},
issn = {1996-1073},
url = {https://www.mdpi.com/1996-1073/14/22/7566},
doi = {10.3390/en14227566},
abstract = {The expansion of electric vehicles made the expansion of charging infrastructure rudimentary to keep up with this developing technology that helps people in a myriad of ways. The main drawback in electric vehicle charging, however, is the time consumed to charge a vehicle. The fast charging of electric vehicles solves this problem thus making it a lucrative technology for consumers. However, the fast charging technology is not without its limitations. In this paper we have identified the technology gaps in EV fast charging stations mostly focused on the extremely fast charging topology. It will help pave a path for researchers to direct their effort in a consolidated manner to contribute to the fast charging infrastructure. A thorough review of all aspects and limitations of existing extremely fast charging (XFC) stations have been identified and supporting data are provided. The importance of DC power network based on free fuel energy sources and silicon carbide-based power electronics are proposed to provide ultra-low cost and ultra-high speed XFC stations.},
number = {22},
urldate = {2024-03-04},
journal = {Energies},
author = {Deb, Naireeta and Singh, Rajendra and Brooks, Richard R. and Bai, Kevin},
month = jan,
year = {2021},
note = {Number: 22
Publisher: Multidisciplinary Digital Publishing Institute},
keywords = {electric vehicles, extremely fast chargers, power electronics},
pages = {7566},
file = {Full Text PDF:/home/jakob/Zotero/storage/V6NEWIC3/Deb et al. - 2021 - A Review of Extremely Fast Charging Stations for E.pdf:application/pdf},
}
@article{tu_extreme_2019,
title = {Extreme {Fast} {Charging} of {Electric} {Vehicles}: {A} {Technology} {Overview}},
volume = {5},
issn = {2332-7782},
shorttitle = {Extreme {Fast} {Charging} of {Electric} {Vehicles}},
url = {https://ieeexplore.ieee.org/document/8930619},
doi = {10.1109/TTE.2019.2958709},
abstract = {With the number of electric vehicles (EVs) on the rise, there is a need for an adequate charging infrastructure to serve these vehicles. The emerging extreme fast-charging (XFC) technology has the potential to provide a refueling experience similar to that of gasoline vehicles. In this article, we review the state-of-the-art EV charging infrastructure and focus on the XFC technology, which will be necessary to support the current and future EV refueling needs. We present the design considerations of the XFC stations and review the typical power electronics converter topologies suitable to deliver XFC. We consider the benefits of using the solid-state transformers (SSTs) in the XFC stations to replace the conventional line-frequency transformers and further provide a comprehensive review of the medium-voltage SST designs for the XFC application.},
number = {4},
urldate = {2024-03-04},
journal = {IEEE Transactions on Transportation Electrification},
author = {Tu, Hao and Feng, Hao and Srdic, Srdjan and Lukic, Srdjan},
month = dec,
year = {2019},
note = {Conference Name: IEEE Transactions on Transportation Electrification},
keywords = {Batteries, Charging stations, dc fast charger, Electric vehicle charging, electric vehicles (EVs), extreme fast charging (XFC), Petroleum, Power demand, solid-state transformer (SST), Standards},
pages = {861--878},
file = {IEEE Xplore Abstract Record:/home/jakob/Zotero/storage/YKIQ45QV/8930619.html:text/html;IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/KAIWC5NK/Tu et al. - 2019 - Extreme Fast Charging of Electric Vehicles A Tech.pdf:application/pdf},
}
@article{das_electric_2020,
title = {Electric vehicles standards, charging infrastructure, and impact on grid integration: {A} technological review},
volume = {120},
issn = {1364-0321},
shorttitle = {Electric vehicles standards, charging infrastructure, and impact on grid integration},
url = {https://www.sciencedirect.com/science/article/pii/S1364032119308251},
doi = {10.1016/j.rser.2019.109618},
abstract = {Transportation electrification is one of the main research areas for the past decade. Electric vehicles (EVs) are taking over the market share of conventional internal combustion engine vehicles. The increasing popularity of EVs results in higher number of charging stations, which have significant effects on the electricity grid. Different charging strat2egies, as well as grid integration methods, are being developed to minimize the adverse effects of EV charging and to strengthen the benefits of EV grid integration. In this paper, a comprehensive review of the current situation of the EV market, standards, charging infrastructure, and the impact of EV charging on the grid is presented. The paper introduces the current EV status, and provides a comprehensive review on important international EV charging and grid interconnection standards. Different infrastructure configurations in terms of control and communication architectures for EV charging are studied and evaluated. The electric power market is studied by considering the participation roles of EV aggregators and individual EV owners, and different optimization and game based algorithms for EV grid integration management are reviewed. The paper specially presents an evaluation on how the future EV development, such as connected vehicles, autonomous driving, and shared mobility, would affect EV grid integration as well as the development of the power grid moves toward future energy Internet and how EVs would affect and benefit the development of the future energy Internet. Finally, the challenges and suggestions for the future development of the EV charging and grid integration infrastructure are evaluated and summarized.},
urldate = {2024-03-04},
journal = {Renewable and Sustainable Energy Reviews},
author = {Das, H. S. and Rahman, M. M. and Li, S. and Tan, C. W.},
month = mar,
year = {2020},
keywords = {Standards, Charging infrastructure, Electric vehicle, Energy internet, Grid integration},
pages = {109618},
file = {Das et al. - 2020 - Electric vehicles standards, charging infrastructu.pdf:/home/jakob/Zotero/storage/PFDKXLVB/Das et al. - 2020 - Electric vehicles standards, charging infrastructu.pdf:application/pdf;ScienceDirect Snapshot:/home/jakob/Zotero/storage/QL42HYNM/S1364032119308251.html:text/html},
}
@inproceedings{nasr_chargeprint_2023,
address = {San Diego, CA, USA},
title = {{ChargePrint}: {A} {Framework} for {Internet}-{Scale} {Discovery} and {Security} {Analysis} of {EV} {Charging} {Management} {Systems}},
isbn = {978-1-891562-83-9},
shorttitle = {{ChargePrint}},
url = {https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s84_paper.pdf},
doi = {10.14722/ndss.2023.23084},
abstract = {Electric Vehicle Charging Management Systems (EVCMS) are a collection of specialized software that allow users to remotely operate Electric Vehicle Charging Stations (EVCS). With the increasing number of deployed EVCS to support the growing global EV fleet, the number of EVCMS are consequently growing, which introduces a new attack surface. In this paper, we propose a novel multi-stage framework, ChargePrint, to discover Internet-connected EVCMS and investigate their security posture. ChargePrint leverages identifiers extracted from a small seed of EVCMS to extend the capabilities of device search engines through iterative fingerprinting and a combination of classification and clustering approaches. Using initial seeds from 1,800 discovered hosts that deployed 9 distinct EVCMS, we identified 27,439 online EVCS instrumented by 44 unique EVCMS. Consequently, our in-depth security analysis highlights the insecurity of the deployed EVCMS by uncovering 120 0day vulnerabilities, which shed light on the feasibility of cyber attacks against the EVCS, its users, and the connected power grid. Finally, while we recommend countermeasures to mitigate future threats, we contribute to the security of the EVCS ecosystem by conducting a Coordinated Vulnerability Disclosure (CVD) effort with system developers/vendors who acknowledged and assigned the discovered vulnerabilities more than 20 CVE-IDs.},
urldate = {2024-04-19},
booktitle = {Proceedings 2023 {Network} and {Distributed} {System} {Security} {Symposium}},
publisher = {Internet Society},
author = {Nasr, Tony and Torabi, Sadegh and Bou-Harb, Elias and Fachkha, Claude and Assi, Chadi},
year = {2023},
file = {Nasr et al. - 2023 - ChargePrint A Framework for Internet-Scale Discov.pdf:/home/jakob/Zotero/storage/ZJG9GLWF/Nasr et al. - 2023 - ChargePrint A Framework for Internet-Scale Discov.pdf:application/pdf},
}
@article{nasr_large-scale_nodate,
title = {Large-{Scale} {Study} of {Internet}-{Connected} {Electric} {Vehicle} {Charging} {Station} {Management} {Systems}: {Discovery}, {Security} {Analysis} and {Mitigation}},
author = {Nasr, Tony},
file = {Nasr - Large-Scale Study of Internet-Connected Electric V.pdf:/home/jakob/Zotero/storage/KGQHQCUT/Nasr - Large-Scale Study of Internet-Connected Electric V.pdf:application/pdf},
}
@techreport{mccarthy_cybersecurity_2023,
address = {Gaithersburg, MD},
title = {Cybersecurity framework profile for electric vehicle extreme fast charging infrastructure},
url = {https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8473.pdf},
abstract = {This document is the Cybersecurity Framework Profile (Profile) developed for the Electric Vehicle Extreme Fast Charging (EV/XFC) ecosystem, including the four domains that relies on the ecosystem (i) Electric Vehicles (EV); (ii) Extreme Fast Charging (XFC); (iii) XFC Cloud or Third-Party Operations; and (iv) Utility and Building Networks. This Profile utilizes the NIST Cybersecurity Framework Version 1.1 and provides voluntary guidance to help relevant parties develop Profiles specific to their organization to understand, assess, and communicate their cybersecurity posture as a part of their risk management process. The Profile is intended to supplement, not replace, an existing risk management program or cybersecurity standards, regulations, and industry guidelines that are in current use by the EV/XFC industry.},
number = {NIST IR 8473},
urldate = {2024-05-02},
institution = {National Institute of Standards and Technology (U.S.)},
publisher = {National Institute of Standards and Technology (U.S.)},
author = {McCarthy, Jim and Grayson, Nakia R and Brule, Joseph and Dinerman, Alan and Dombrowski, John and Thompson, Michael and Tran, Hillary and Townsend, Anne},
month = oct,
year = {2023},
doi = {10.6028/NIST.IR.8473},
pages = {NIST IR 8473},
file = {McCarthy et al. - 2023 - Cybersecurity framework profile for electric vehic.pdf:/home/jakob/Zotero/storage/V3KL8AU8/McCarthy et al. - 2023 - Cybersecurity framework profile for electric vehic.pdf:application/pdf},
}
@inproceedings{assi_ensuring_2023,
address = {Cosenza, Italy},
title = {Ensuring a {Resilient} and {Secure} {EV} {Charging} {Infrastructure} for {Sustainable} {Transportation}},
copyright = {https://doi.org/10.15223/policy-029},
isbn = {9798350319514},
url = {https://ieeexplore.ieee.org/document/10286958/},
doi = {10.1109/ICT-DM58371.2023.10286958},
abstract = {The increased greenhouse gas emissions and their threat on the environment are fueling society's embrace of a green mindset. As part of their fight against climate change, governments are diligently working on shifting the traditional transportation system to a greener one, mainly driven by Electric Vehicles (EVs). EVs have become a major component of the global push to combat climate change, owing to their ability to reduce the emissions of the transportation sector especially when coupled with renewable energy resources. To support the exponential rise in EV numbers, EV Charging Stations (EVCSs) are being deployed rapidly by operators and manufacturers alike. As a result, EVCSs have become an indispensable element of the transportation system. This highlights the need for a reliable and secure ecosystem to support the charging needs of EVs and achieve a sustainable transportation sector. Our research group studies the EVCS ecosystem security through examining its different components. The importance of the security of this ecosystem originates from the crucial service it provides and its connection to critical infrastructure such as the power grid. Our work focuses on uncovering the vulnerabilities of the EV ecosystem that can allow attackers to destabilize the power grid as well as developing to secure this ecosystem and Machine/Deep Learning intrusion/attack detection.},
urldate = {2024-05-02},
booktitle = {2023 {International} {Conference} on {Information} and {Communication} {Technologies} for {Disaster} {Management} ({ICT}-{DM})},
publisher = {IEEE},
author = {Assi, Chadi},
month = sep,
year = {2023},
pages = {1--1},
file = {Assi - 2023 - Ensuring a Resilient and Secure EV Charging Infras.pdf:/home/jakob/Zotero/storage/CIL4K4V5/Assi - 2023 - Ensuring a Resilient and Secure EV Charging Infras.pdf:application/pdf},
}
@inproceedings{skarga-bandurova_cyber_2022,
address = {Osaka, Japan},
title = {Cyber {Security} of {Electric} {Vehicle} {Charging} {Infrastructure}: {Open} {Issues} and {Recommendations}},
copyright = {https://doi.org/10.15223/policy-029},
isbn = {978-1-66548-045-1},
shorttitle = {Cyber {Security} of {Electric} {Vehicle} {Charging} {Infrastructure}},
url = {https://ieeexplore.ieee.org/document/10020644/},
doi = {10.1109/BigData55660.2022.10020644},
abstract = {The paper analyses cyber security challenges of smart cities with a particular focus on the intelligent integrated and interconnected electric vehicle (EV) charging infrastructure. The analysis indicates that not all innovative elements and smart city solutions have adequate cybersecurity protection. Digital technologies vary considerably in terms of the level of potential risks, with certain novel technologies —such as V2G, smart charging, and smart energy management —posing higher risks than others. It is intended to lay a foundation for securing EV charging infrastructure by analysing problem context and data to be protected, including attack surfaces and cybersecurity threats and vulnerabilities in the EV ecosystem, analysing standardisation for the EV connection to the charging infrastructure, and providing a set of recommendations and best practices to securing EV charging infrastructure.},
urldate = {2024-05-02},
booktitle = {2022 {IEEE} {International} {Conference} on {Big} {Data} ({Big} {Data})},
publisher = {IEEE},
author = {Skarga-Bandurova, Inna and Kotsiuba, Igor and Biloborodova, Tetiana},
month = dec,
year = {2022},
pages = {3099--3106},
file = {Skarga-Bandurova et al. - 2022 - Cyber Security of Electric Vehicle Charging Infras.pdf:/home/jakob/Zotero/storage/TEKWIRET/Skarga-Bandurova et al. - 2022 - Cyber Security of Electric Vehicle Charging Infras.pdf:application/pdf},
}
@inproceedings{ahalawat_security_2022,
address = {Singapore, Singapore},
title = {Security {Threats} in {Electric} {Vehicle} {Charging}},
copyright = {https://doi.org/10.15223/policy-029},
isbn = {978-1-66543-254-2},
url = {https://ieeexplore.ieee.org/document/9961027/},
doi = {10.1109/SmartGridComm52983.2022.9961027},
abstract = {The electric vehicle (EV) charging system plays a significant role in the future of energy systems. The widespread adoption of operating EV charging is accelerates the integration of transmission and distribution systems, this helps to accommodate a clean atmosphere and drop conventional fuel dependence. An EV interacts with different objects while recharging in the charging station. The charging stations that power up such vehicles can also be connected to the internet and make them particularly to malicious attack through hacking or remote accessing. Thus, this technology has caught the attention of many researchers who have proposed authentication protocols to provide a secure connection for exchanging information between electric vehicles and the charging station. This article discusses comprehensive security threats in the EV charging systems. Moreover, it reviews the architecture of the charging station system and the protocols between electric vehicles and charging stations.},
urldate = {2024-05-02},
booktitle = {2022 {IEEE} {International} {Conference} on {Communications}, {Control}, and {Computing} {Technologies} for {Smart} {Grids} ({SmartGridComm})},
publisher = {IEEE},
author = {Ahalawat, Anchal and Adepu, Sridhar and Gardiner, Joseph},
month = oct,
year = {2022},
pages = {399--404},
file = {Ahalawat et al. - 2022 - Security Threats in Electric Vehicle Charging.pdf:/home/jakob/Zotero/storage/FUQAJ6XW/Ahalawat et al. - 2022 - Security Threats in Electric Vehicle Charging.pdf:application/pdf},
}
@article{garofalaki_electric_2022,
title = {Electric {Vehicle} {Charging}: {A} {Survey} on the {Security} {Issues} and {Challenges} of the {Open} {Charge} {Point} {Protocol} ({OCPP})},
volume = {24},
copyright = {https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html},
issn = {1553-877X, 2373-745X},
shorttitle = {Electric {Vehicle} {Charging}},
url = {https://ieeexplore.ieee.org/document/9800931/},
doi = {10.1109/COMST.2022.3184448},
abstract = {The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate this communication and is already being used in many implementations. However, only the latest OCPP 2.0 version of the protocol includes certain security features. In this article, we present the entities that take part in an OCPP-based smart charging scenario, we identify security issues and threats and present solutions that have been proposed by scholars. We identify open security issues for OCPP and propose future research directions for the security enhancement of the protocol.},
number = {3},
urldate = {2024-05-02},
journal = {IEEE Communications Surveys \& Tutorials},
author = {Garofalaki, Zacharenia and Kosmanos, Dimitrios and Moschoyiannis, Sotiris and Kallergis, Dimitrios and Douligeris, Christos},
year = {2022},
pages = {1504--1533},
file = {Garofalaki et al. - 2022 - Electric Vehicle Charging A Survey on the Securit.pdf:/home/jakob/Zotero/storage/W3JHKC23/Garofalaki et al. - 2022 - Electric Vehicle Charging A Survey on the Securit.pdf:application/pdf},
}
@article{chen_enfuzz_nodate,
title = {{EnFuzz}: {Ensemble} {Fuzzing} with {Seed} {Synchronization} among {Diverse} {Fuzzers}},
abstract = {Fuzzing is widely used for vulnerability detection. There are various kinds of fuzzers with different fuzzing strategies, and most of them perform well on their targets. However, in industrial practice, it is found that the performance of those well-designed fuzzing strategies is challenged by the complexity and diversity of real-world applications. In this paper, we systematically study an ensemble fuzzing approach. First, we define the diversity of base fuzzers in three heuristics: diversity of coverage information granularity, diversity of input generation strategy and diversity of seed selection and mutation strategy. Based on those heuristics, we choose several of the most recent base fuzzers that are as diverse as possible, and propose a globally asynchronous and locally synchronous (GALS) based seed synchronization mechanism to seamlessly ensemble those base fuzzers and obtain better performance. For evaluation, we implement EnFuzz based on several widely used fuzzers such as QSYM and FairFuzz, and then we test them on LAVA-M and Google’s fuzzing-test-suite, which consists of 24 widely used real-world applications. This experiment indicates that, under the same constraints for resources, these base fuzzers perform differently on different applications, while EnFuzz always outperforms other fuzzers in terms of path coverage, branch coverage and bug discovery. Furthermore, EnFuzz found 60 new vulnerabilities in several well-fuzzed projects such as libpng and libjpeg, and 44 new CVEs were assigned.},
author = {Chen, Yuanliang and Jiang, Yu and Ma, Fuchen and Liang, Jie and Wang, Mingzhe and Zhou, Chijin and Jiao, Xun and Su, Zhuo},
file = {Chen et al. - EnFuzz Ensemble Fuzzing with Seed Synchronization.pdf:/home/jakob/Zotero/storage/LPRB5IZT/Chen et al. - EnFuzz Ensemble Fuzzing with Seed Synchronization.pdf:application/pdf},
}
@misc{jiang_survey_2024,
title = {A {Survey} of {Network} {Protocol} {Fuzzing}: {Model}, {Techniques} and {Directions}},
shorttitle = {A {Survey} of {Network} {Protocol} {Fuzzing}},
url = {http://arxiv.org/abs/2402.17394},
abstract = {As one of the most successful and effective software testing techniques in recent years, fuzz testing has uncovered numerous bugs and vulnerabilities in modern software, including network protocol software. In contrast to other fuzzing targets, network protocol software exhibits its distinct characteristics and challenges, introducing a plethora of research questions that need to be addressed in the design and implementation of network protocol fuzzers. While some research work has evaluated and systematized the knowledge of general fuzzing techniques at a high level, there is a lack of similar analysis and summarization for fuzzing research specific to network protocols. This paper offers a comprehensive exposition of network protocol software’s fuzzing-related features and conducts a systematic review of some representative advancements in network protocol fuzzing since its inception. We summarize state-of-the-art strategies and solutions in various aspects, propose a unified protocol fuzzing process model, and introduce the techniques involved in each stage of the model. At the same time, this paper also summarizes the promising research directions in the landscape of protocol fuzzing to foster exploration within the community for more efficient and intelligent modern network protocol fuzzing techniques.},
urldate = {2024-05-15},
publisher = {arXiv},
author = {Jiang, Shihao and Zhang, Yu and Li, Junqiang and Yu, Hongfang and Luo, Long and Sun, Gang},
month = feb,
year = {2024},
note = {arXiv:2402.17394 [cs]},
keywords = {Computer Science - Networking and Internet Architecture},
file = {Jiang et al. - 2024 - A Survey of Network Protocol Fuzzing Model, Techn.pdf:/home/jakob/Zotero/storage/ZC5JGT9X/Jiang et al. - 2024 - A Survey of Network Protocol Fuzzing Model, Techn.pdf:application/pdf},
}
@inproceedings{hu_systematic_2021,
address = {Chongqing, China},
title = {A {Systematic} {Review} of {Network} {Protocol} {Fuzzing} {Techniques}},
copyright = {https://doi.org/10.15223/policy-029},
isbn = {978-1-72818-535-4},
url = {https://ieeexplore.ieee.org/document/9482063/},
doi = {10.1109/IMCEC51613.2021.9482063},
abstract = {Improper network protocol implementations usually bring about serious consequences. Therefore, network protocol security testing has become a hot area of research in network and information security. Popular vulnerability discovery techniques include static analysis, dynamic analysis, fuzzing and so on. With the increasing scale and complexity of software, fuzzing has incomparable advantages over other vulnerability discovery techniques and becomes the most common and effective one in network protocol security testing. Firstly, this paper introduces the basic principle and classification of network protocol fuzzing. Then this paper briefly shows the basic process of network protocol fuzzing and the fundamental structure of a network protocol fuzzing system. Next, this paper describes research advances of network protocol fuzzing techniques and machine learning techniques applied to network protocol fuzzing in details. Finally, this paper concludes some existing problems of network protocol fuzzing techniques and discusses future research directions.},
urldate = {2024-05-15},
booktitle = {2021 {IEEE} 4th {Advanced} {Information} {Management}, {Communicates}, {Electronic} and {Automation} {Control} {Conference} ({IMCEC})},
publisher = {IEEE},
author = {Hu, Zhihao and Pan, Zulie},
month = jun,
year = {2021},
pages = {1000--1005},
file = {Hu and Pan - 2021 - A Systematic Review of Network Protocol Fuzzing Te.pdf:/home/jakob/Zotero/storage/TW6XP2I7/Hu and Pan - 2021 - A Systematic Review of Network Protocol Fuzzing Te.pdf:application/pdf},
}
@article{fu_framework_2023,
title = {A {Framework} of {High}-{Speed} {Network} {Protocol} {Fuzzing} {Based} on {Shared} {Memory}},
copyright = {https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html},
issn = {1545-5971, 1941-0018, 2160-9209},
url = {https://ieeexplore.ieee.org/document/10262045/},
doi = {10.1109/TDSC.2023.3318571},
abstract = {In recent years, security test of network protocols based on fuzzing has been attracting more and more attentions. This is very challenging compared with the stateless software fuzzing and most early network protocol fuzzers are of low speed and poor test effect. Since the first greybox and stateful fuzzer named AFLNET was proposed, several new schemes have been designed to improve its performance from different aspects. During the research, a great challenge is how to greatly improve the fuzzing efficiency. Based on the basic analysis in SNPSFuzzer, this paper provides a more thorough analysis about the time consumption in a fuzzing iteration for 13 network protocols and then we design a High-speed Network Protocol Fuzzer named HNPFuzzer. In HNPFuzzer, the test cases and response messages between the client and server are transmitted through the shared memory, guided by a precise synchronizer, rather than the socket interfaces. This greatly shorten the period of an iteration. Moreover, we design a persistent mode attempting to fuzz the service instances in the memory more than one time based on analyzing the side effect information. This mode further improves the speed of fuzzing. Experiment results illustrate that our scheme can improve the fuzzing throughput by about 39.66 times in average and triggers a large number of crashes including 2 new vulnerabilities which cannot discovered by existing fuzzers. Note that, the existing network protocol fuzzing schemes proposed in different directions do not compete with each other and on the contrary, they can collaborate with each other to improve the overall fuzzing effect and efficiency. Consequently, more existing tools can be integrated into our framework to get better network protocol fuzzing effect.},
urldate = {2024-05-15},
journal = {IEEE Transactions on Dependable and Secure Computing},
author = {Fu, Junsong and Xiong, Shuai and Wang, Na and Ren, Ruiping and Zhou, Ang and Bhargava, Bharat K.},
year = {2023},
pages = {1--18},
file = {Fu et al. - 2023 - A Framework of High-Speed Network Protocol Fuzzing.pdf:/home/jakob/Zotero/storage/EG7Q8ECC/Fu et al. - 2023 - A Framework of High-Speed Network Protocol Fuzzing.pdf:application/pdf},
}
@article{gao_fw-fuzz_2022,
title = {Fw-fuzz: {A} code coverage-guided fuzzing framework for network protocols on firmware},
volume = {34},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5756},
doi = {https://doi.org/10.1002/cpe.5756},
abstract = {Summary Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case generation, cross-architecture instrumentation, and fault detection. In this article, we propose the Fw-fuzz, a coverage-guided and crossplatform framework for fuzzing network services running in the context of firmware on embedded architectures, which can generate more valuable test cases by introspecting program runtime information and using a genetic algorithm model. Specifically, we propose novel dynamic instrumentation in Fw-fuzz to collect the running state of the firmware program. Then Fw-fuzz adopts a genetic algorithm model to guide the generation of inputs with high code coverage. We fully implement the prototype system of Fw-fuzz and conduct evaluations on network service programs of various architectures in MIPS, ARM, and PPC. By comparing with the protocol fuzzers Boofuzz and Peach in metrics of edge coverage, our prototype system achieves an average growth of 33.7\% and 38.4\%, respectively. We further verify six known vulnerabilities and discover 5 0-day vulnerabilities with the Fw-fuzz, which prove the validity and utility of our framework. The overhead of our system expressed as an additional 5\% of memory growth.},
number = {16},
journal = {Concurrency and Computation: Practice and Experience},
author = {Gao, Zicong and Dong, Weiyu and Chang, Rui and Wang, Yisen},
year = {2022},
note = {\_eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.5756},
keywords = {code coverage, firmware, fuzzing, instrumentation, security},
pages = {e5756},
file = {Full Text:/home/jakob/Zotero/storage/GKZYYSBN/Gao et al. - 2022 - Fw-fuzz A code coverage-guided fuzzing framework .pdf:application/pdf},
}
@article{zhang_survey_2023,
title = {A {Survey} on the {Development} of {Network} {Protocol} {Fuzzing} {Techniques}},
volume = {12},
issn = {2079-9292},
url = {https://www.mdpi.com/2079-9292/12/13/2904},
doi = {10.3390/electronics12132904},
abstract = {Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in network protocols pose significant risks to network operations and security. Network protocol fuzzing is an effective technique for discovering and mitigating security flaws in network protocols. It offers unparalleled advantages compared to other security analysis techniques thanks to the minimal requirement for prior knowledge of the target and low deployment complexity. Nevertheless, the randomness in test case generation, uncontrollable test coverage, and unstable testing efficiency introduce challenges in ensuring the controllability of the testing process and results. In order to comprehensively survey the development of network protocol fuzzing techniques and analyze their advantages and existing issues, in this paper, we categorized and summarized the protocol fuzzing and its related techniques based on the generation methods of test cases and testing conditions. Specifically, we overviewed the development trajectory and patterns of these techniques over the past two decades according to chronological order. Based on this analysis, we further predict the future directions of fuzzing techniques.},
number = {13},
journal = {Electronics},
author = {Zhang, Zhaowei and Zhang, Hongzheng and Zhao, Jinjing and Yin, Yanfei},
year = {2023},
file = {Full Text:/home/jakob/Zotero/storage/DL9C2H8R/Zhang et al. - 2023 - A Survey on the Development of Network Protocol Fu.pdf:application/pdf},
}
@inproceedings{andarzian_green-fuzz_2024,
address = {Cham},
title = {Green-{Fuzz}: {Efficient} {Fuzzing} for {Network} {Protocol} {Implementations}},
isbn = {978-3-031-57537-2},
abstract = {Recent techniques have significantly improved fuzzing, discovering many vulnerabilities in various software systems. However, certain types of systems, such as network protocols, are still challenging to fuzz. This article presents two enhancements that allow efficient fuzzing of network protocols. The first is Desock+, which simulates a network socket and supports different POSIX options to make Desock+ suitable for faster network protocol fuzzing. The second is Green-Fuzz, which sends input messages in one go and reduces the system-call overhead while fuzzing network protocols. We applied this modification to AFLNet, but it could be applied to any fuzzer for stateful systems. This is the maximum overhead we can avoid, when doing out-process fuzzing on stateful systems. Our evaluation shows that these enhancements make AFLNet up to four times faster.},
booktitle = {Foundations and {Practice} of {Security}},
publisher = {Springer Nature Switzerland},
author = {Andarzian, Seyed Behnam and Daniele, Cristian and Poll, Erik},
editor = {Mosbah, Mohamed and Sèdes, Florence and Tawbi, Nadia and Ahmed, Toufik and Boulahia-Cuppens, Nora and Garcia-Alfaro, Joaquin},
year = {2024},
pages = {253--268},
file = {Andarzian et al. - 2024 - Green-Fuzz Efficient Fuzzing for Network Protocol.pdf:/home/jakob/Zotero/storage/HY9UHF66/Andarzian et al. - 2024 - Green-Fuzz Efficient Fuzzing for Network Protocol.pdf:application/pdf},
}
@article{bao_threat_2018,
title = {A threat analysis of the vehicle-to-grid charging protocol {ISO} 15118},
volume = {33},
issn = {1865-2042},
url = {https://doi.org/10.1007/s00450-017-0342-y},
doi = {10.1007/s00450-017-0342-y},
abstract = {This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for vulnerabilities, which could be used by an adversary to gain unfair advantage over the charging process and use it for his own self-interest, mostly harming legitimate users or other participants.},
number = {1},
urldate = {2024-06-14},
journal = {Computer Science - Research and Development},
author = {Bao, Kaibin and Valev, Hristo and Wagner, Manuela and Schmeck, Hartmut},
month = feb,
year = {2018},
keywords = {Electric vehicle, Charging protocol, ISO 15118, Thread analysis, Vehicle-to-grid},
pages = {3--12},
file = {Full Text PDF:/home/jakob/Zotero/storage/6D3AH9CT/Bao et al. - 2018 - A threat analysis of the vehicle-to-grid charging .pdf:application/pdf},
}
@article{acharya_cybersecurity_2020,
title = {Cybersecurity of {Smart} {Electric} {Vehicle} {Charging}: {A} {Power} {Grid} {Perspective}},
volume = {8},
issn = {2169-3536},
shorttitle = {Cybersecurity of {Smart} {Electric} {Vehicle} {Charging}},
url = {https://ieeexplore.ieee.org/abstract/document/9272723},
doi = {10.1109/ACCESS.2020.3041074},
abstract = {With the roll-out of electric vehicles (EVs), the automobile industry is transitioning away from conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously growing and to meet this growing demand, various types of electric vehicle charging stations (EVCSs) are being deployed for commercial and residential use. This nexus of EVs, EVCSs, and power grids creates complex cyber-physical interdependencies that can be maliciously exploited to damage each of these components. This paper describes and analyzes cyber vulnerabilities that arise at this nexus and points to the current and emerging gaps in the security of the EV charging ecosystem. These vulnerabilities must be addressed as the number of EVs continue to grow worldwide and their impact on the power grid becomes more viable. The purpose of this paper is to list and characterize all backdoors that can be exploited to seriously harm either EV and EVCS equipments, or power grid, or both. The presented issues and challenges intend to ignite research efforts on cybersecurity of smart EV charging and enhancing power grid resiliency against such demand-side cyberattacks in general.},
urldate = {2024-06-14},
journal = {IEEE Access},
author = {Acharya, Samrat and Dvorkin, Yury and Pandžić, Hrvoje and Karri, Ramesh},
year = {2020},
note = {Conference Name: IEEE Access},
keywords = {electric vehicles, Electric vehicle charging, Computer crime, Computer security, Cybersecurity, electric vehicle charging stations, HVAC, Power grids, Protocols, Security, smart grids},
pages = {214434--214453},
file = {IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/AGYK7WPI/Acharya et al. - 2020 - Cybersecurity of Smart Electric Vehicle Charging .pdf:application/pdf},
}
@inproceedings{kohler_brokenwire_2023,
title = {Brokenwire : {Wireless} {Disruption} of {CCS} {Electric} {Vehicle} {Charging}},
shorttitle = {Brokenwire},
url = {http://arxiv.org/abs/2202.02104},
doi = {10.14722/ndss.2023.23251},
abstract = {We present a novel attack against the Combined Charging System, one of the most widely used DC rapid charging technologies for electric vehicles (EVs). Our attack, Brokenwire, interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack requires only temporary physical proximity and can be conducted wirelessly from a distance, allowing individual vehicles or entire fleets to be disrupted stealthily and simultaneously. In addition, it can be mounted with off-the-shelf radio hardware and minimal technical knowledge. By exploiting CSMA/CA behavior, only a very weak signal needs to be induced into the victim to disrupt communication - exceeding the effectiveness of broadband noise jamming by three orders of magnitude. The exploited behavior is a required part of the HomePlug Green PHY, DIN 70121 \& ISO 15118 standards and all known implementations exhibit it. We first study the attack in a controlled testbed and then demonstrate it against eight vehicles and 20 chargers in real deployments. We find the attack to be successful in the real world, at ranges up to 47 m, for a power budget of less than 1 W. We further show that the attack can work between the floors of a building (e.g., multi-story parking), through perimeter fences, and from `drive-by' attacks. We present a heuristic model to estimate the number of vehicles that can be attacked simultaneously for a given output power. Brokenwire has immediate implications for a substantial proportion of the around 12 million battery EVs on the roads worldwide - and profound effects on the new wave of electrification for vehicle fleets, both for private enterprise and crucial public services, as well as electric buses, trucks and small ships. As such, we conducted a disclosure to the industry and discussed a range of mitigation techniques that could be deployed to limit the impact.},
urldate = {2024-06-14},
booktitle = {Proceedings 2023 {Network} and {Distributed} {System} {Security} {Symposium}},
author = {Köhler, Sebastian and Baker, Richard and Strohmeier, Martin and Martinovic, Ivan},
year = {2023},
note = {arXiv:2202.02104 [cs]},
keywords = {Computer Science - Cryptography and Security},
file = {arXiv Fulltext PDF:/home/jakob/Zotero/storage/XUF4ILJK/Köhler et al. - 2023 - Brokenwire Wireless Disruption of CCS Electric V.pdf:application/pdf;arXiv.org Snapshot:/home/jakob/Zotero/storage/G289FIYW/2202.html:text/html},
}
@inproceedings{lee_study_2014,
title = {Study on {Analysis} of {Security} {Vulnerabilities} and {Countermeasures} in {ISO}/{IEC} 15118 {Based} {Electric} {Vehicle} {Charging} {Technology}},
url = {https://ieeexplore.ieee.org/document/7021815},
doi = {10.1109/ICITCS.2014.7021815},
abstract = {Electric vehicle, which is one of the major components and research areas of Smartgrid, has been considered as one way of reducing greenhouse gas. ISO/IEC 15118 standard defines data and communication interface to charge electric vehicles. The data is used in communication between electric vehicles and power charging infrastructure. In this paper, the security vulnerabilities of ISO/IEC 15118 standard based charging technology are analyzed, and the countermeasures for them are proposed.},
urldate = {2024-06-14},
booktitle = {2014 {International} {Conference} on {IT} {Convergence} and {Security} ({ICITCS})},
author = {Lee, Seokcheol and Park, Yongmin and Lim, Hyunwoo and Shon, Taeshik},
month = oct,
year = {2014},
keywords = {Security, Electric vehicles, Electricity, IEC standards, ISO standards},
pages = {1--4},
file = {IEEE Xplore Abstract Record:/home/jakob/Zotero/storage/V56B3AF4/7021815.html:text/html;IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/QVVSN6GE/Lee et al. - 2014 - Study on Analysis of Security Vulnerabilities and .pdf:application/pdf},
}
@article{kilic_tls-handshake_2024,
title = {{TLS}-handshake for {Plug} and {Charge} in vehicular communications},
volume = {243},
issn = {1389-1286},
url = {https://www.sciencedirect.com/science/article/pii/S1389128624001130},
doi = {10.1016/j.comnet.2024.110281},
abstract = {Electric vehicle technology has brought some important issues to order. Securing the communication between electric vehicle and charging station is an important one. The International Organization for Standardization released ISO 15118 standard to specify the communication between electric vehicles and electric vehicle supply equipment. The ISO 15118 standard requires Transport Layer Security function for secure charging communication between electric vehicle and charging station as mandatory. The Transport Layer Security requirements have been completely changed with the latest version of the standard (ISO 15118-20) and have not been clearly described and implemented yet. The implementation of the function causes an inevitable vulnerability due to non-functioning authentication resulting with the entire vehicle function and security system can suddenly stop working. For this reason, new Transport Layer Security protocol must urgently be analyzed, developed, integrated, and implemented. This study proposes solutions for the development, implementation, realization of Transport Layer Security handshake requirements and functions between electric vehicle and charging station with ISO 15118 protocol. The new and existing Transport Layer Security requirements, analyzed, evaluated and the new Transport Layer Security functions derived and fully described. Based on these requirements and functions, a Transport Layer Security communication sequence and processes are developed and implemented and validated on the test bench. The validation proved sufficient implementation of the Transport Layer Security functions (successful authentication, exchange of cipher suite parameters and generation of the TLS master key). The messages were prosperous encrypted and decrypted with the generated master key. Thus, Transport Layer Security handshake is developed, implemented, and validated with this study.},
urldate = {2024-06-14},
journal = {Computer Networks},
author = {Kilic, Ahmet},
month = apr,
year = {2024},
keywords = {Charging infrastructure, Electric vehicle, Security, Cipher suites, Communication protocol, ISO 15118 protocol, Secure communication, Transport layer security (TLS)},
pages = {110281},
}
@inproceedings{baker_losing_2019,
title = {Losing the {Car} {Keys}: {Wireless} \{{PHY}-{Layer}\} {Insecurity} in \{{EV}\} {Charging}},
isbn = {978-1-939133-06-9},
shorttitle = {Losing the {Car} {Keys}},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/baker},
urldate = {2024-06-14},
author = {Baker, Richard and Martinovic, Ivan},
year = {2019},
pages = {407--424},
file = {Full Text PDF:/home/jakob/Zotero/storage/98IFP5BA/Baker and Martinovic - 2019 - Losing the Car Keys Wireless PHY-Layer Insecuri.pdf:application/pdf},
}
@inproceedings{vu_living_2024,
address = {New York, NY, USA},
series = {{ACM} {SE} '24},
title = {Living on the {Electric} {Vehicle} and {Cloud} {Era}: {A} {Study} of {Cyber} {Vulnerabilities}, {Potential} {Impacts}, and {Possible} {Strategies}},
isbn = {9798400702372},
shorttitle = {Living on the {Electric} {Vehicle} and {Cloud} {Era}},
url = {https://dl.acm.org/doi/10.1145/3603287.3651209},
doi = {10.1145/3603287.3651209},
abstract = {In recent years, electric vehicles (EVs) have emerged as a sustainable alternative to conventional automobiles. Distinguished by their environmental friendliness, superior performance, reduced noise, and low maintenance requirements, EVs offer numerous advantages over traditional vehicles. The integration of electric vehicles with cloud computing has heralded a transformative shift in the automotive industry. However, as EVs become increasingly interconnected with the internet, various devices, and infrastructure, they become susceptible to cyberattacks. These attacks pose a significant risk to the safety, privacy, and functionality of both the vehicles and the broader transportation infrastructure. In this paper, we delve into the topic of electric vehicles and their connectivity to the cloud. We scrutinize the potential attack vectors that EVs are vulnerable to and the consequential impact on vehicle operations. Moreover, we outline both general and specific strategies aimed at thwarting these cyberattacks. Additionally, we anticipate future developments aimed at enhancing EV performance and reducing security risks.},
urldate = {2024-06-14},
booktitle = {Proceedings of the 2024 {ACM} {Southeast} {Conference}},
publisher = {Association for Computing Machinery},
author = {Vu, Long and Suo, Kun and Islam, Md Romyull and Dhar, Nobel and Nguyen, Tu N. and He, Selena and Shi, Yong},
month = apr,
year = {2024},
keywords = {Connectivity, Cyber Security, Electric Vehicle, Hardware, Software},
pages = {18--26},
file = {Full Text PDF:/home/jakob/Zotero/storage/WHNUIR7P/Vu et al. - 2024 - Living on the Electric Vehicle and Cloud Era A St.pdf:application/pdf},
}
@inproceedings{vailoces_securing_2023,
address = {New York, NY, USA},
series = {{DIVANet} '23},
title = {Securing the {Electric} {Vehicle} {Charging} {Infrastructure}: {An} {In}-{Depth} {Analysis} of {Vulnerabilities} and {Countermeasures}},
isbn = {9798400703690},
shorttitle = {Securing the {Electric} {Vehicle} {Charging} {Infrastructure}},
url = {https://dl.acm.org/doi/10.1145/3616392.3623424},
doi = {10.1145/3616392.3623424},
abstract = {The growth of electric vehicle (EV) adoption is bringing an increased demand for electric vehicle supply equipment (EVSE) infrastructure. With this growth, however, it is inevitable that vulnerabilities are discovered, which motivates an in-depth analysis of the security posture of EVSE infrastructure and development of a strong cybersecurity program to ensure its security and resiliency. In this research paper, we will analyze and highlight various vulnerabilities in EVSE systems, including weak authentication mechanisms, and end-to-end communications. We will identify as well potential attack scenarios that can create vulnerabilities that have consequences that range from physical damage to major service disruptions, and identify various solutions and countermeasures to mitigate these vulnerabilities.},
urldate = {2024-06-14},
booktitle = {Proceedings of the {Int}'l {ACM} {Symposium} on {Design} and {Analysis} of {Intelligent} {Vehicular} {Networks} and {Applications}},
publisher = {Association for Computing Machinery},
author = {Vailoces, Gerald and Keith, Alexander and Almehmadi, Abdulaziz and El-Khatib, Khalil},
month = oct,
year = {2023},
keywords = {cybersecurity, central management systems, charging stations, countermeasures, electric vehicle, vulnerabilities},
pages = {31--38},
file = {Full Text PDF:/home/jakob/Zotero/storage/IKC95BD9/Vailoces et al. - 2023 - Securing the Electric Vehicle Charging Infrastruct.pdf:application/pdf},
}
@article{sarieddine_investigating_2023,
title = {Investigating the {Security} of {EV} {Charging} {Mobile} {Applications} as an {Attack} {Surface}},
volume = {7},
issn = {2378-962X},
url = {https://dl.acm.org/doi/10.1145/3609508},
doi = {10.1145/3609508},
abstract = {The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this article, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.},
number = {4},
urldate = {2024-06-14},
journal = {ACM Transactions on Cyber-Physical Systems},
author = {Sarieddine, Khaled and Sayed, Mohammad Ali and Torabi, Sadegh and Atallah, Ribal and Assi, Chadi},
month = oct,
year = {2023},
keywords = {Electric vehicle charging, cyber-physical systems, mobile application, security analysis},
pages = {26:1--26:28},
file = {Full Text PDF:/home/jakob/Zotero/storage/P64QI6MG/Sarieddine et al. - 2023 - Investigating the Security of EV Charging Mobile A.pdf:application/pdf},
}
@article{bharathidasan_review_2022,
title = {A review on electric vehicle: {Technologies}, energy trading, and cyber security},
volume = {8},
issn = {2352-4847},
shorttitle = {A review on electric vehicle},
url = {https://www.sciencedirect.com/science/article/pii/S235248472201410X},
doi = {10.1016/j.egyr.2022.07.145},
abstract = {The energy transition is an essential effort from a variety of sectors and levels to achieve a carbon-neutral, larger-renewable integrated civilization. The transportation industry, which is largely concentrated in urban areas, emits more than 20\% of total greenhouse gas emissions. Various technological difficulties are confronted and resolved as a result of this focus. Consequently, pursuit and research focusing on the integration of electric vehicles (EVs) powered by renewable energy sources are currently a viable option for combating climate change and advancing energy transition. According to current trends, this type of service will diminish the use of internal combustion engines in the future months. A study of the global market scenario for EVs and their future prospects is conducted. Whether energy storage devices and power electronics converters are properly interfaced determines the efficiency of EVs. Moreover, we provide our thoughts on what to expect in the near future in this domain and even the research areas that are still accessible to both industrial and academics.},
urldate = {2024-06-14},
journal = {Energy Reports},
author = {Bharathidasan, Mohan and Indragandhi, V. and Suresh, Vishnu and Jasiński, Michał and Leonowicz, Zbigniew},
month = nov,
year = {2022},
keywords = {Electric vehicle, Communication technology, Cyber security, Energy trading},
pages = {9662--9685},
}
@article{antoun_detailed_2020,
title = {A {Detailed} {Security} {Assessment} of the {EV} {Charging} {Ecosystem}},
volume = {34},
issn = {1558-156X},
url = {https://ieeexplore.ieee.org/document/8994200},
doi = {10.1109/MNET.001.1900348},
abstract = {The drive for efficient, reliable, green, and connected smart cities has promoted the use of electric vehicles (EVs) as the main future means of transportation. This resulted in a breakthrough in the anticipated number of adopted EVs by the year 2020, and consequently an urge for an available and trustworthy EV charging infrastructure. The diversity of the involved players, the used technologies, the bulk data exchange, and the widespread nature of the charging network give rise to security concerns in the form of message tampering, spoofing, or delaying among others to disconcert the charging service along with the underlying power layer. Furthermore, confidentiality and privacy of user information (i.e. identity, location, payment information, etc.) is another major concern associated with the deployment and use of the charging infrastructure. Thus, there is a need to identify and classify such concerns, and devise suitable solutions for a secure charging infrastructure. In this paper, we present a security assessment of the EV charging infrastructure. We highlight and categorize cyber threats targeting different players in a charging system, along with the security solutions presented in the literature. Finally, we present a gap analysis and insights into future research directions for EV charging system security.},
number = {3},
urldate = {2024-06-14},
journal = {IEEE Network},
author = {Antoun, Joseph and Kabir, Mohammad Ekramul and Moussa, Bassam and Atallah, Ribal and Assi, Chadi},
month = may,
year = {2020},
note = {Conference Name: IEEE Network},
keywords = {Charging stations, Electric vehicle charging, Security, Meters, Pricing, Smart meters},
pages = {200--207},
file = {IEEE Xplore Abstract Record:/home/jakob/Zotero/storage/TPIBRXUE/8994200.html:text/html;IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/2NQBAR7H/Antoun et al. - 2020 - A Detailed Security Assessment of the EV Charging .pdf:application/pdf},
}
@inproceedings{pratt_vehicle_2019,
title = {Vehicle {Charging} {Infrastructure} {Security}},
url = {https://ieeexplore.ieee.org/document/8662043},
doi = {10.1109/ICCE.2019.8662043},
abstract = {The electric vehicle charging infrastructure supports Plug-in Electric Vehicle (PEV) refueling through vehicle charging equipment (EVSE). Communication and control methods are being developed and tested to respond to growing PEV electrical load and enable this new grid load to expand renewable resource integration and grid services, without additional electrical distribution system capacity and investment. The new communication and control method increases the potential for cyberattacks or malware to pass through the electric vehicle charging infrastructure. The infrastructure-comprising EVs, EVSEs, building automation and energy management systems, and electric power grid-can be adversely impacted, negatively affecting safety, reliability and efficacy objectives.In this work, we describe principles of Vehicle Charging Infrastructure Security (VCIS) that addresses critical gaps in the present security paradigm, while retaining privacy and autonomy of stakeholders. The VCIS principles we enumerate are: isolate network communications, implement advanced, continuous monitoring by "trusted" entities, verify compatibility of physical measurements and cyber state, and incorporate processes to respond and recover to cyberattacks commensurate with the threat. We further foresee that information sharing and coordination between car manufacturers, EVSE vendors, facilities, and electric utilities is essential for VCIS success.},
urldate = {2024-06-14},
booktitle = {2019 {IEEE} {International} {Conference} on {Consumer} {Electronics} ({ICCE})},
author = {Pratt, Richard M. and Carroll, Thomas E.},
month = jan,
year = {2019},
note = {ISSN: 2158-4001},
keywords = {Reliability, Power grids, Security, Control systems, Energy management, Malware},
pages = {1--5},
file = {IEEE Xplore Abstract Record:/home/jakob/Zotero/storage/NBRI5PMI/8662043.html:text/html;IEEE Xplore Full Text PDF:/home/jakob/Zotero/storage/VSAALFIV/Pratt and Carroll - 2019 - Vehicle Charging Infrastructure Security.pdf:application/pdf},
}
@article{sklyar_chargepoint_nodate,
title = {{ChargePoint} {Home} security research},
author = {Sklyar, Dmitry},
journal = {Kaspersky Lab Security Services},
year = {2018},
file = {Sklyar - ChargePoint Home security research.pdf:/home/jakob/Zotero/storage/JZTHXLSI/Sklyar - ChargePoint Home security research.pdf:application/pdf},
}
@inproceedings{li_crosstalk_2019,
address = {Xi'an, China},
title = {Crosstalk {Analysis} between {Power} {Lines} and {Signal} {Lines} {Based} on the {Finite} {Difference}-{Time} {Domain} {Method}},
copyright = {https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html},
isbn = {978-1-72811-722-5},
url = {https://ieeexplore.ieee.org/document/9224975/},
doi = {10.1109/APAP47170.2019.9224975},
abstract = {The crosstalk of the power line to the safety monitoring signal line in the rectangular tunnel leads to the unstable state of the safety monitoring signal, especially producing the misreport or omission which seriously affects the safety of the power equipment and personnel. In this paper, the crosstalk shielded cable model is established for the signal line affected by the electromagnetic interference of the power line, based on the actual electrical parameters of cables. The purpose of this paper is to solve the transfer impedance of the shielded cable and calculate the characteristics of crosstalk by the Finite Difference-Time Domain method (FDTD). Finally, the variation rules of terminal matching load, terminal direct grounding and crosstalk under different layouts are studied. The results have certain reference value for perfecting the theory of monitoring and communication in rectangular tunnel and exerting the safety guarantee function of power safety monitoring equipment.},
urldate = {2024-06-29},
booktitle = {2019 {IEEE} 8th {International} {Conference} on {Advanced} {Power} {System} {Automation} and {Protection} ({APAP})},
publisher = {IEEE},
author = {Li, Aidi and Liu, Qing and Yang, Jiayi and Zhou, Ningxin},
month = oct,
year = {2019},
pages = {638--641},
file = {Li et al. - 2019 - Crosstalk Analysis between Power Lines and Signal .pdf:/home/jakob/Zotero/storage/3FKD4GMA/Li et al. - 2019 - Crosstalk Analysis between Power Lines and Signal .pdf:application/pdf},
}
@inproceedings{theethayi_parameters_2003,
address = {Bologna, Italy},
title = {Parameters that influence the crosstalk in multiconductor transmission line},
volume = {1},
isbn = {978-0-7803-7967-1},
url = {http://ieeexplore.ieee.org/document/1304162/},
doi = {10.1109/PTC.2003.1304162},
abstract = {Transient surges in one of the overhead conductors, due to direct lightning strike, causes crosstalk (interference) in other adjacent conductors. It’s a common phenomenon observed in power lines, communication lines and electrified railway lines. In this paper we investigate the crosstalk in multi-conductor transmission lines (MTLs) above finitely conducting ground as a function of ground conductivity, height of the receptor conductor, position of emitter source and the terminal loads. It is shown that ground conductivity has a significant influence in the amplitude and wave shape of the crosstalk currents in MTLs, which has not received sufficient attention earlier. In general finite ground conductivity increases the crosstalk current magnitudes in the receptor circuit loads both at the near end and far end. There are situations in which far end crosstalk is larger than the near end crosstalk for identical loads at both ends. These observations have important implications in electromagnetic interference studies of outdoor systems such as railway signaling systems subjected to lightning strikes.},
urldate = {2024-06-29},
booktitle = {2003 {IEEE} {Bologna} {Power} {Tech} {Conference} {Proceedings},},
publisher = {IEEE},
author = {Theethayi, N. and Thottappillil, R. and {Yaqing Liu} and Montano, R.},
year = {2003},
pages = {388--395},
file = {Theethayi et al. - 2003 - Parameters that influence the crosstalk in multico.pdf:/home/jakob/Zotero/storage/ISNXS77V/Theethayi et al. - 2003 - Parameters that influence the crosstalk in multico.pdf:application/pdf},
}
@article{ngo_bisse_crosstalk_2023,
title = {Crosstalk {Characterization} and {Reduction} in {Power} {Lines}},
volume = {10},
issn = {23199598},
url = {https://www.ijies.org/portfolio-item/C78830912323/},
doi = {10.35940/ijies.C7883.0910923},
abstract = {We propose a technique of crosstalk reduction through power lines. This crosstalk reduction technique uses the pseudomatched impedances’ method that determines the characteristic parameters of the chosen line through the transmission lines’ theory. Besides, we establish the telegrapher's equations to determine the characteristic impedances of the line. Further, two types of lines are employed here to apply the pseudo-matched impedances’ method. The far-and near-ends crosstalk are measured with two strategies known as Simulink diagram and Matlab code. The Simulink diagram of the power line provides crosstalk curves and the Matlab code directly returns crosstalk values. It appears that the crosstalk has a reduction rate between 20 and 50\% compared to previous investigations using pseudomatched impedances in literature. Moreover, the variation of two different types of impedances leads to a crosstalk reduction rate that approaches 99\%.},
number = {9},
urldate = {2024-06-29},
journal = {International Journal of Inventive Engineering and Sciences},
author = {Ngo Bisse, Dr. Jacquie Therese and Onana Essama, Dr. Bedel Giscard and Koko Koko, Dr. Joseph and Atangana, Prof. Jacques and Ndjakomo Essiane, Prof. Salomé},
month = sep,
year = {2023},
pages = {1--11},
file = {Crosstalk-Characterization-and-Reduction-in-Power-Lines.pdf:/home/jakob/Zotero/storage/XRB3LBU4/Crosstalk-Characterization-and-Reduction-in-Power-Lines.pdf:application/pdf},
}
@article{encs_security_nodate,
title = {Security test plan for {EV} charging station},
url = {https://encs.eu/resource/ev-401-2019-security-test-plan-for-ev-charging-stations/},
author = {ENCS},
journal = {European Network for Cyber Security},
year = {2019},
file = {Encs - Security test plan for EV charging station.pdf:/home/jakob/Zotero/storage/Z4V32ZSH/Encs - Security test plan for EV charging station.pdf:application/pdf},
}
@misc{charin_charin_nodate,
title = {{CharIN} {V2G} {PKI} goes live!},
url = {https://www.charin.global/news/charin-v2g-pki-goes-live/},
howpublished = {\url{https://www.charin.global/news/charin-v2g-pki-goes-live/}},
urldate = {2024-06-30},
year = {2022},
author = {CharIN},
file = {CharIN V2G PKI goes live! – CharIN:/home/jakob/Zotero/storage/55D88B85/charin-v2g-pki-goes-live.html:text/html},
}
@misc{nexusgroup_identities_nodate,
title = {Identities for {Plug} and {Charge}/vehicle-to-grid - {V2G} {PKI}},
url = {https://doc.nexusgroup.com/pub/identities-for-vehicle-to-grid-v2g-pki},
howpublished = {\url{https://doc.nexusgroup.com/pub/identities-for-vehicle-to-grid-v2g-pki}},
abstract = {Nexus' solution for protecting vehicle-to-grid communication (V2G) with PKI certificates is compliant with the ISO 15118-2/20 standard and used in plug and charge applications.},
urldate = {2024-06-30},
author = {nexusgroup},
file = {Snapshot:/home/jakob/Zotero/storage/ZF4ABS7T/identities-for-vehicle-to-grid-v2g-pki.html:text/html},
}
@misc{irdeto_irdeto_nodate,
title = {Irdeto {Launches} {North} {American} {V2G} {Trusted} {Root} {CA} to {Accelerate} {Plug} \& {Charge} {Adoption}},
url = {https://irdeto.com/news/irdeto-launches-north-american-v2g-trusted-root-ca-to-accelerate-plug-charge-adoption},
howpublished = {\url{https://irdeto.com/news/irdeto-launches-north-american-v2g-trusted-root-ca-to-accelerate-plug-charge-adoption}},
abstract = {Initiative signifies a major advancement in allowing trusted communication between charging stations and electric vehicles, fully supporting Vehicle-to-Grid (V2G) and Plug \& Charge interactions in adherence to ISO 15118 standards.},
urldate = {2024-06-30},
author = {irdeto},
file = {Snapshot:/home/jakob/Zotero/storage/YGP6AVKC/irdeto-launches-north-american-v2g-trusted-root-ca-to-accelerate-plug-charge-adoption.html:text/html},
}
@misc{hubject_download_nodate,
title = {Download {Public} {Key} {Infrastructure} ({PKI}) {\textbar} {Hubject}},
url = {https://www.hubject.com/download-pki},
howpublished = {\url{https://www.hubject.com/download-pki}},
abstract = {The Hubject Certificate Policy sets forth the business, legal, \& technical requirements governing the use of Hubject’s V2G CA Certificates by participants in the Hubject Public Key Infrastructure (PKI) used for Plug\&Charge.},
urldate = {2024-06-30},
author = {Hubject},
file = {Snapshot:/home/jakob/Zotero/storage/A2GS4492/download-pki.html:text/html},
}
@misc{rohde_access_2023,
title = {Access {Capabilities} {Through} {Ccs} {Communications} {Protocol} (acccs)},
url = {https://www.osti.gov/biblio/2281893},
howpublished = {\url{https://www.osti.gov/biblio/2281893}},
author = {Rohde, Kenneth W and Guidry, Jake M. and Chugg, Jonathan P. and Energy, USDOE Office of Nuclear},
month = nov,
year = {2023},
doi = {10.11578/dc.20240115.2},
}
@misc{dalheimer_ladeinfrastruktur_2017,
title = {Ladeinfrastruktur für {Elektroautos}: {Ausbau} statt {Sicherheit} (English: Charging infrastructure for electric cars: Expansion instead of safety)},
url = {https://media.ccc.de/v/34c3-9092-ladeinfrastruktur_fur_elektroautos_ausbau_statt_sicherheit},
howpublished = {\url{https://media.ccc.de/v/34c3-9092-ladeinfrastruktur_fur_elektroautos_ausbau_statt_sicherheit}},
author = {Dalheimer, Mathias},
month = dec,
year = {2017},
}
@misc{bundesnetzagentur_anzahl_2024,
title = {Anzahl der öffentlichen {Ladepunkte} in {Deutschland} von {Januar} 2017 bis {Oktober} 2023 (English: Number of public {charging points} in {Germany} from {January} 2017 to {October} 2023},
url = {https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/Energie/Unternehmen_Institutionen/E_Mobilitaet/Ladesaeuleninfrastruktur.xlsx?__blob=publicationFile&v=5},
howpublished = {\url{https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/Energie/Unternehmen_Institutionen/E_Mobilitaet/Ladesaeuleninfrastruktur.xlsx?__blob=publicationFile&v=5}},
author = {{Bundesnetzagentur (English: Federal Network Agency)}},
month = feb,
year = {2024},
}
@misc{kraftfahrtbundesamt_anzahl_2024,
title = {Anzahl der {Elektroautos} in {Deutschland} von 2006 bis {Januar} 2024 (English: Number of {electric cars} in {Germany} from 2006 to {January} 2024)},
url = {https://www.kba.de/SharedDocs/Downloads/DE/Pressemitteilungen/DE/2024/pm_08_2024_bestand_01_24_merkmale_excel.xlsx?__blob=publicationFile&v=6},
howpublished = {\url{https://www.kba.de/SharedDocs/Downloads/DE/Pressemitteilungen/DE/2024/pm_08_2024_bestand_01_24_merkmale_excel.xlsx?__blob=publicationFile&v=6}},
author = {{Kraftfahrtbundesamt (English: Federal Motor Transport Authority)}},
month = mar,
year = {2024},
}
@misc{google_clusterfuzz_2024,
title = {Clusterfuzz: {Scalable} fuzzing infrastructure that finds security and stability issues in software.},
url = {https://google.github.io/clusterfuzz/},
howpublished = {\url{https://google.github.io/clusterfuzz/}},
author = {{Google}},
month = may,
year = {2024},
}
@misc{google_atheris_2024,
title = {Atheris: {A} {Coverage}-{Guided}, {Native} {Python} {Fuzzer}},
url = {https://github.com/google/atheris},
howpublished = {\url{https://github.com/google/atheris}},
author = {{Google}},
month = may,
year = {2024},
}
@misc{iec_iec_2010,
title = {{IEC} 61851-1 ed2.0: {Electric} vehicle conductive charging system - {Part} 1: {General} requirements},
url = {http://webstore.iec.ch/webstore/webstore.nsf/Artnum_PK/44636},
howpublished = {\url{http://webstore.iec.ch/webstore/webstore.nsf/Artnum_PK/44636}},
author = {{IEC}},
year = {2010},
keywords = {iec iec61851},
}
@misc{isoiec_isoiec_2012,
title = {{ISO}/{IEC} {DIS} 15118-2: {Road} vehicles - {Vehicle} to grid communication interface – {Part} 2: {Network} and application protocol requirements},
url = {http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?ics1=43&ics2=120&ics3=&csnumber=55366},
howpublished = {\url{http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?ics1=43&ics2=120&ics3=&csnumber=55366}},
author = {{ISO/IEC}},
year = {2012},
keywords = {iec iso iso15118},
}
@misc{isoiec_isoiec_2012-1,
title = {{ISO}/{IEC} {DIS} 15118-3: {Road} vehicles - {Vehicle} to grid communication interface – {Part} 3: {Physical} and data link layer requirements},
url = {http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?ics1=43&ics2=120&ics3=&csnumber=59675},
howpublished = {\url{http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?ics1=43&ics2=120&ics3=&csnumber=59675}},
author = {{ISO/IEC}},
year = {2012},
keywords = {iec iso iso15118},
}
@article{blech_project_nodate,
title = {Project {ChaoJi}: the background and challenges of harmonising {DC} charging standards},
abstract = {Nicknamed ChaoJi, the co-development of a new DC charging standard harmonising two of the three existing international DC fast charging systems, CHAdeMO and GB/T, started in 2018 as a Japan-China bilateral project. This unprecedented work of creating a brand-new plug that handles up to 900kW, while ensuring safety and backward compatibility with the existing systems, evolved into an international technical collaboration platform of experts beyond these two countries. With the sole objective of making a truly excellent new system, the experts voluntarily joined, bringing together their knowledge and market experience from around the world, and marked a turning point from battles for charging technology supremacy to international cooperation for the long-term harmonisation of standards.},
author = {Blech, Tomoko},
journal = {CHAdeMO Europe},
file = {Blech - Project ChaoJi the background and challenges of h.pdf:/home/jakob/Zotero/storage/3B8MEPC4/Blech - Project ChaoJi the background and challenges of h.pdf:application/pdf},
}
@misc{noauthor_trends_nodate,
title = {Trends in electric cars – {Global} {EV} {Outlook} 2024 – {Analysis}},
url = {https://www.iea.org/reports/global-ev-outlook-2024/trends-in-electric-cars},
howpublished = {\url{https://www.iea.org/reports/global-ev-outlook-2024/trends-in-electric-cars}},
abstract = {Global EV Outlook 2024 - Analysis and key findings. A report by the International Energy Agency.},
language = {en-GB},
urldate = {2024-07-05},
journal = {IEA},
file = {Snapshot:/home/jakob/Zotero/storage/KS6V4J3P/trends-in-electric-cars.html:text/html},
}
@misc{noauthor_opening_nodate,
title = {Opening the {North} {American} {Charging} {Standard}},
url = {https://www.tesla.com/blog/opening-north-american-charging-standard},
howpublished = {\url{https://www.tesla.com/blog/opening-north-american-charging-standard}},
urldate = {2024-07-05},
journal = {Tesla},
file = {Snapshot:/home/jakob/Zotero/storage/RZA7EIWY/opening-north-american-charging-standard.html:text/html},
}
@misc{mliu92_drawing_2021,
title = {Drawing of {J1772} ({CCS1} {Combo}) connector, with labeled pinouts.},
shorttitle = {ccs1},
url = {https://commons.wikimedia.org/w/index.php?curid=108177318},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=108177318}},
urldate = {2024-07-26},
author = {{Mliu92}},
month = aug,
year = {2021},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/WEWXRXQ7/index.html:text/html},
}
@misc{rickycourtney_drawing_2023,
title = {Drawing of {North} {American} {Charging} {Standard} connector, with labeled pinouts.},
shorttitle = {nacs},
url = {https://commons.wikimedia.org/w/index.php?curid=133111353},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=133111353}},
urldate = {2024-07-26},
author = {{RickyCourtney}},
month = jun,
year = {2023},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/A7PIMMVB/index.html:text/html},
}
@misc{mliu92_speculative_2022,
title = {Speculative diagram of {Megawatt} {Charging} {System}, version 3.2.},
shorttitle = {mcs},
url = {https://commons.wikimedia.org/w/index.php?curid=119080953},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=119080953}},
urldate = {2024-07-26},
author = {{Mliu92}},
month = jun,
year = {2022},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/NFY5VVJB/index.html:text/html},
}
@misc{mliu92_gbt-202343_2021,
title = {{GBT}-20234.3 electric vehicle connector pinout for {DC} charging.},
shorttitle = {gbt},
url = {https://commons.wikimedia.org/w/index.php?curid=108206603},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=108206603}},
urldate = {2024-07-26},
author = {{Mliu92}},
month = aug,
year = {2021},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/3QA8LNAJ/index.html:text/html},
}
@misc{mliu92_chademo_2021,
title = {{CHAdeMO} connector (viewed facing the plug that interfaces with the vehicle)},
shorttitle = {chademo},
url = {https://commons.wikimedia.org/w/index.php?curid=108209697},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=108209697}},
urldate = {2024-07-26},
author = {{Mliu92}},
month = aug,
year = {2021},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/LG7R44PH/index.html:text/html},
}
@misc{chris828_type_2020,
title = {Type 2 charging socket, {VDE}-{AR}-{E} 2623-2-2 plug},
shorttitle = {type2},
url = {https://commons.wikimedia.org/w/index.php?curid=89574378},
howpublished = {\url{https://commons.wikimedia.org/w/index.php?curid=89574378}},
urldate = {2024-07-26},
author = {{Chris828}},
month = apr,
year = {2020},
file = {Wikimedia Snapshot:/home/jakob/Zotero/storage/NTMMZWJU/index.html:text/html},
}
@misc{noauthor_audi_nodate,
title = {Audi e-tron models with high charging performance.},
url = {https://www.audi-mediacenter.com/en/press-releases/audi-e-tron-models-with-high-charging-performance-12758},
howpublished = {\url{https://www.audi-mediacenter.com/en/press-releases/audi-e-tron-models-with-high-charging-performance-12758}},
abstract = {The charging process is central to the everyday usability of an electric car. The shorter the stop required for charging the higher the customer’s satisfaction. Drivers of a fully electric Audi model thus benefit from high charging speeds because the charging capacity of up to 150 kW is available for a large portion of the charging procedure. This enables sophisticated thermal management of the lithium-ion battery. In order to assess the everyday usability of an electric car, customers should take not just the nominal maximum charging capacity but also the charging speed into account.},
urldate = {2024-08-05},
journal = {Audi MediaCenter},
file = {Snapshot:/home/jakob/Zotero/storage/RW7J8R92/audi-e-tron-models-with-high-charging-performance-12758.html:text/html},
}
@misc{noauthor_dokumentation_nodate,
title = {Dokumentation der {Stromtankstellen} {API}.},
url = {https://www.goingelectric.de/stromtankstellen/api/docs/},
howpublished = {\url{https://www.goingelectric.de/stromtankstellen/api/docs/}},
urldate = {2024-08-05},
file = {Dokumentation der Stromtankstellen API | GoingElectric.de:/home/jakob/Zotero/storage/LHVL8GF9/docs.html:text/html},
}c
@inproceedings{Lauser2023,
author = {Lauser, Timm and Krau\ss{}, Christoph},
title = {Formal Security Analysis of Vehicle Diagnostic Protocols},
year = {2023},
isbn = {9798400707728},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3600160.3600184},
doi = {10.1145/3600160.3600184},
abstract = {Diagnostic protocols for vehicles are important for maintenance, updates, etc. However, if they are not secure, an attacker can use them as an entry point to the vehicle or even directly access critical functionality. In this paper, we discuss the security of the vehicle diagnostics protocols Diagnostics over IP (DoIP) and Unified Diagnostic Services (UDS). For UDS, we provide a formal analysis of the included security protocols SecurityAccess service and the different variants of the new Authentication service introduced in the year 2020. We present two new vulnerabilities, we identified in our analyses, describe how they can be mitigated and formally verify our mitigations. Furthermore, we give recommendations on how to securely implement UDS and how future standards can be improved.},
booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security},
articleno = {21},
numpages = {11},
keywords = {diagnostics, formal analysis, security, vehicle},
location = {Benevento, Italy},
series = {ARES '23}
}