scispace - formally typeset
P

Pal-Stefan Murvay

Researcher at Politehnica University of Timișoara

Publications -  42
Citations -  992

Pal-Stefan Murvay is an academic researcher from Politehnica University of Timișoara. The author has contributed to research in topics: CAN bus & Authentication. The author has an hindex of 9, co-authored 42 publications receiving 686 citations.

Papers
More filters
Journal ArticleDOI

A survey on gas leak detection and localization techniques

TL;DR: This paper identifies the state-of-the-art in leak detection and localization methods and evaluates the capabilities of these techniques in order to identify the advantages and disadvantages of using each leak detection solution.
Journal ArticleDOI

Source Identification Using Signal Characteristics in Controller Area Networks

TL;DR: This work tries to take authentication up to unique physical characteristics of the frames that are placed by each node on the bus, and shows that distinguishing between certain nodes is clearly possible and each message can be precisely linked to its sender.
Journal ArticleDOI

Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks

TL;DR: An intrusion detection mechanism that takes advantage of Bloom filtering to test frame periodicity based on message identifiers and parts of the data-field which facilitates detection of potential replay or modification attacks is proposed.
Journal ArticleDOI

Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks

TL;DR: This work discusses the most promising approaches for assuring security on the controller area network (CAN) bus after a decade of attacks and security proposals, and suggests that the moment for adoption and standardization by the industry has come.
Journal ArticleDOI

Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol

TL;DR: It is determined that existing shortcomings in the SAE J1939 specifications open road to several new attacks, e.g., impersonation, denial of service (DoS), distributed DoS, etc.