default search action
Bogdan Groza
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Camil Jichici, Adriana Berdich, Adrian Musuroi, Bogdan Groza:
Control System Level Intrusion Detection on J1939 Heavy-Duty Vehicle Buses. IEEE Trans. Ind. Informatics 20(2): 2029-2041 (2024) - [j31]Adriana Berdich, Bogdan Groza:
Cyberattacks on Adaptive Cruise Controls and Emergency Braking Systems: Adversary Models, Impact Assessment, and Countermeasures. IEEE Trans. Reliab. 73(2): 1216-1230 (2024) - 2023
- [j30]Adriana Berdich, Bogdan Groza, René Mayrhofer:
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers. IEEE Internet Things J. 10(16): 14646-14670 (2023) - [j29]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j28]Adriana Berdich, Bogdan Groza, René Mayrhofer, Efrat Levy, Asaf Shabtai, Yuval Elovici:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [c53]Adriana Berdich, Patricia Iosif, Camelia Burlacu, Alfred Anistoroaei, Bogdan Groza:
Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks. SACI 2023: 39-44 - [c52]Lucian Popa, Camil Jichici, Tudor Andreica, Pal-Stefan Murvay, Bogdan Groza:
Impact of Wiring Characteristics on Voltage-based Fingerprinting in Controller Area Networks. SACI 2023: 231-236 - 2022
- [j27]Tudor Andreica, Christian-Daniel Curiac, Camil Jichici, Bogdan Groza:
Android Head Units vs. In-Vehicle ECUs: Performance Assessment for Deploying In-Vehicle Intrusion Detection Systems for the CAN Bus. IEEE Access 10: 95161-95178 (2022) - [j26]Adriana Berdich, Bogdan Groza, Efrat Levy, Asaf Shabtai, Yuval Elovici, René Mayrhofer:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j25]Adriana Berdich, Bogdan Groza:
Smartphone Camera Identification from Low-Mid Frequency DCT Coefficients of Dark Images. Entropy 24(8): 1158 (2022) - [j24]Lucian Popa, Bogdan Groza, Camil Jichici, Pal-Stefan Murvay:
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles. IEEE Trans. Inf. Forensics Secur. 17: 1185-1200 (2022) - [j23]Camil Jichici, Bogdan Groza, Radu Ragobete, Pal-Stefan Murvay, Tudor Andreica:
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus. IEEE Trans. Intell. Transp. Syst. 23(10): 17425-17439 (2022) - [c51]Alfred Anistoroaei, Bogdan Groza, Pal-Stefan Murvay, Horatiu Gurban:
Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition. AQTR 2022: 1-6 - [c50]Bogdan Groza, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - 2021
- [j22]Pal-Stefan Murvay, Lucian Popa, Bogdan Groza:
Securing the controller area network with covert voltage channels. Int. J. Inf. Sec. 20(6): 817-831 (2021) - [j21]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN. IEEE Trans. Inf. Forensics Secur. 16: 601-616 (2021) - [j20]Adrian Musuroi, Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
Fast and Efficient Group Key Exchange in Controller Area Networks (CAN). IEEE Trans. Veh. Technol. 70(9): 9385-9399 (2021) - [c49]Bogdan Groza, Pal-Stefan Murvay, Lucian Popa, Camil Jichici:
CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses. ESORICS (1) 2021: 668-690 - [c48]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [i4]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - 2020
- [j19]Bogdan Groza, Adriana Berdich, Camil Jichici, Rene Mayrhofer:
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport. IEEE Access 8: 9246-9259 (2020) - [j18]Pal-Stefan Murvay, Bogdan Groza:
TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network. IEEE Access 8: 68895-68912 (2020) - [j17]Bogdan Groza, Tudor Andreica, Adriana Berdich, Pal-Stefan Murvay, Eugen Horatiu Gurban:
PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units. IEEE Access 8: 119105-119122 (2020) - [j16]Gyorgy Kolumban-Antal, Vladko Lasak, Razvan Bogdan, Bogdan Groza:
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring. Sensors 20(2): 403 (2020) - [j15]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
Highly Efficient Authentication for CAN by Identifier Reallocation With Ordered CMACs. IEEE Trans. Veh. Technol. 69(6): 6129-6140 (2020) - [j14]Pal-Stefan Murvay, Bogdan Groza:
Efficient Physical Layer Key Agreement for FlexRay Networks. IEEE Trans. Veh. Technol. 69(9): 9767-9780 (2020) - [c47]Adriana Berdich, Alfred Anistoroaei, Bogdan Groza, Horatiu Gurban, Pal-Stefan Murvay, Daniel Iercan:
ANTARES - ANonymous Transfer of vehicle Access Rights from External cloud Services. VTC Spring 2020: 1-5
2010 – 2019
- 2019
- [j13]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
TRICKS - Time TRIggered Covert Key Sharing for Controller Area Networks. IEEE Access 7: 104294-104307 (2019) - [j12]Bogdan Groza, Pal-Stefan Murvay:
Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay. Sensors 19(22): 4919 (2019) - [j11]Bogdan Groza, Pal-Stefan Murvay:
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks. IEEE Trans. Inf. Forensics Secur. 14(4): 1037-1051 (2019) - [c46]Lucian Popa, Bogdan Groza, Pal-Stefan Murvay:
Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers. ARES 2019: 100:1-100:7 - [c45]Pal-Stefan Murvay, Lucian Popa, Bogdan Groza:
Accommodating Time-Triggered Authentication to FlexRay Demands. CECC 2019: 2:1-2:6 - [c44]Mario Vasile, Bogdan Groza:
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain. ICSTCC 2019: 560-565 - [c43]Tudor Andreica, Bogdan Groza:
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition. IoTSMS 2019: 366-373 - [c42]Adrian Musuroi, Bogdan Groza, Pal-Stefan Murvay, Horatiu Gurban:
Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study. PECCS 2019: 25-33 - [c41]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM. SAFECOMP Workshops 2019: 210-222 - [c40]Camil Jichici, Bogdan Groza, Pal-Stefan Murvay:
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe. SECITC 2019: 241-256 - [i3]Bogdan Groza, Tudor Andreica, Adriana Berdich, Pal-Stefan Murvay, Horatiu Gurban:
PRESTvO: PRivacy Enabled Smartphone-based access To vehicle On-board units. CoRR abs/1911.05144 (2019) - [i2]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
CANTO - Covert AutheNtication with Timing channels over Optimized traffic flows for CAN. CoRR abs/1911.10671 (2019) - 2018
- [j10]Pal-Stefan Murvay, Bogdan Groza:
Security Shortcomings and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol. IEEE Trans. Veh. Technol. 67(5): 4325-4339 (2018) - [j9]Bogdan Groza, Pal-Stefan Murvay:
Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Veh. Technol. Mag. 13(1): 40-47 (2018) - [c39]Pal-Stefan Murvay, Bogdan Groza:
A brief look at the security of DeviceNet communication in industrial control systems. CECC 2018: 5:1-5:6 - [c38]Pal-Stefan Murvay, Bogdan Groza:
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. CRiSIS 2018: 172-187 - [c37]Eugen Horatiu Gurban, Bogdan Groza, Pal-Stefan Murvay:
Risk Assessment and Security Countermeasures for Vehicular Instrument Clusters. DSN Workshops 2018: 223-230 - [c36]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
INCANTA - INtrusion Detection in Controller Area Networks with Time-Covert Authentication. ISSA/CSITS@ESORICS 2018: 94-110 - [c35]Tudor Andreica, Bogdan Groza, Pal-Stefan Murvay:
Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers. SAFECOMP Workshops 2018: 331-343 - [c34]Camil Jichici, Bogdan Groza, Pal-Stefan Murvay:
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks. SecITC 2018: 109-125 - 2017
- [j8]Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede:
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks. ACM Trans. Embed. Comput. Syst. 16(3): 90:1-90:28 (2017) - [c33]Pal-Stefan Murvay, Bogdan Groza:
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. ARES 2017: 71:1-71:10 - [c32]Bogdan Groza, Cosmin Briceag:
A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices. CRiSIS 2017: 115-123 - [c31]Bogdan Groza, Tudor Andreica, Pal-Stefan Murvay:
Designing Wireless Automotive Keys with Rights Sharing Capabilities on the MSP430 Microcontroller. VEHITS 2017: 173-180 - [c30]Bogdan Groza, Horatiu Gurban, Pal-Stefan Murvay:
An Experimental Model for In-vehicle Networks and Subsystems. VEHITS 2017: 326-331 - [i1]Bogdan Groza:
Traffic models with adversarial vehicle behaviour. CoRR abs/1701.07666 (2017) - 2016
- [c29]Pal-Stefan Murvay, Alexandru Matei, Cristina Solomon, Bogdan Groza:
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers. ARES 2016: 117-126 - [c28]Bogdan Groza, Horatiu-Eugen Gurban, Pal-Stefan Murvay:
Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered Viewpoint. DSN Workshops 2016: 176-183 - [c27]Bogdan Groza, Pal-Stefan Murvay, Tudor Andreica:
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers. SECRYPT 2016: 109-120 - 2015
- [c26]Cristina Solomon, Bogdan Groza:
LiMon - Lightweight Authentication for Tire Pressure Monitoring Sensors. CyberICS/WOS-CPS@ESORICS 2015: 95-111 - [c25]Paula Vasile, Bogdan Groza, Pal-Stefan Murvay:
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay. WESS 2015: 7 - 2014
- [j7]Bogdan Groza, Bogdan Warinschi:
Cryptographic puzzles and DoS resilience, revisited. Des. Codes Cryptogr. 73(1): 177-207 (2014) - [j6]Pal-Stefan Murvay, Bogdan Groza:
Source Identification Using Signal Characteristics in Controller Area Networks. IEEE Signal Process. Lett. 21(4): 395-399 (2014) - 2013
- [j5]Marius Cristea, Bogdan Groza:
Fingerprinting Smartphones Remotely via ICMP Timestamps. IEEE Commun. Lett. 17(6): 1081-1083 (2013) - [j4]Bogdan Groza, Pal-Stefan Murvay:
Secure Broadcast with One-Time Signatures in Controller Area Networks. Int. J. Mob. Comput. Multim. Commun. 5(3): 1-18 (2013) - [j3]Pal-Stefan Murvay, Bogdan Groza:
Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. Int. J. Secur. Softw. Eng. 4(4): 1-24 (2013) - [j2]Bogdan Groza, Pal-Stefan Murvay:
Efficient Protocols for Secure Broadcast in Controller Area Networks. IEEE Trans. Ind. Informatics 9(4): 2034-2042 (2013) - [c24]Bogdan Groza, Marius Minea:
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels. CRITIS 2013: 167-178 - 2012
- [c23]Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede:
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. CANS 2012: 185-200 - [c22]Bogdan Groza, Bogdan Warinschi:
Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. ISC 2012: 39-54 - [c21]Bogdan Groza, Rene Mayrhofer:
SAPHE: simple accelerometer based wireless pairing with heuristic trees. MoMM 2012: 161-168 - [c20]Marius Cristea, Bogdan Groza:
Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam. SocialCom/PASSAT 2012: 809-810 - 2011
- [c19]Bogdan Groza, Pal-Stefan Murvay:
Secure Broadcast with One-Time Signatures in Controller Area Networks. ARES 2011: 371-376 - [c18]Marius Cristea, Bogdan Groza, Mihai Iacob:
Some Security Issues in SCALANCE Wireless Industrial Networks. ARES 2011: 493-498 - [c17]Bogdan Groza, Marius Minea:
Formal modelling and automatic detection of resource exhaustion attacks. AsiaCCS 2011: 326-333 - [c16]Pal-Stefan Murvay, Bogdan Groza:
Performance improvements for SHA-3 finalists by exploiting microcontroller on-chip parallelism. CRiSIS 2011: 33-39 - [c15]Bogdan Groza, Pal-Stefan Murvay:
Broadcast Authentication in a Low Speed Controller Area Network. ICETE (Selected Papers) 2011: 330-344 - [c14]Marius Cristea, Bogdan Groza:
Augmenting a Webmail Application with Cryptographic Puzzles to Deflect Spam. NTMS 2011: 1-5 - [c13]Bogdan Groza, Pal-Stefan Murvay:
Higher Layer Authentication for Broadcast in Controller Area Networks. SECRYPT 2011: 188-197 - [e1]Frédéric Cuppens, Simon N. Foley, Bogdan Groza, Marius Minea:
CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1889-2 [contents] - 2010
- [c12]Bogdan Groza, Marius Minea:
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing. Financial Cryptography 2010: 391-399 - [c11]Bogdan Groza, Marius Minea:
Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks. FMCO 2010: 45-60
2000 – 2009
- 2009
- [c10]Bogdan Groza, Marius Minea:
A Calculus to Detect Guessing Attacks. ISC 2009: 59-67 - [c9]Bogdan Groza, Lavinia E. Dragomir:
A multidisciplinary project: How to turn a webcam into a secure-cam. SACI 2009: 381-386 - [c8]Bogdan Groza:
Analysis of a Password Strengthening Technique and Its Practical Use. SECURWARE 2009: 292-297 - 2008
- [j1]Bogdan Groza:
Broadcast Authentication with Practically Unbounded One-way Chains. J. Softw. 3(3): 11-20 (2008) - 2007
- [c7]Bogdan Groza:
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. ARES 2007: 550-557 - [c6]Bogdan Groza, Toma-Leonida Dragomir:
On the use of one-way chain based authentication protocols in secure control systems. ARES 2007: 1214-1221 - [c5]Bogdan Groza, Dorina Petrica, Simona Barbu, Mariana Bilanin:
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java. SACI 2007: 237-240 - [c4]Bogdan Groza:
An Extension of the RSA Trapdoor in a KEM/DEM Framework. SYNASC 2007: 182-187 - 2006
- [c3]Bogdan Groza, Tudor Iclanzan, C. Dumitrescu, A. Taroata:
Neural Network Based Framework for Optimization of Enterprise Resource Planning. CCECE 2006: 1889-1892 - [c2]Bogdan Groza:
Using One-Way Chains to Provide Message Authentication without Shared Secrets. SecPerU 2006: 82-87 - 2005
- [c1]Bogdan Groza, Dorina Petrica:
Cryptanalysis of an Authentication Protocol. SYNASC 2005: 147-153
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint