2021
DOI: 10.1016/j.csi.2021.103539
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of attack mechanisms in the automotive domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111], [112]. Le et al [18] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111], [112]. Le et al [18] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111,112]. Le et al [15] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Eq. ( 11), (12), and ( 13) describe the mathematical operation. Here, k > 0, k ϵ are two features with the index of k.…”
Section: √∑ (mentioning
confidence: 99%
“…Penny [11] introduced a man-in-the-middle attack or relay attack, to do this radio signals are passed between two devices. Pekaric I et al (2021) [12] described other attacks such as GPS spoofing and message injection attacks. BMW Connected Drive [13] seamlessly integrates mobile devices, smart home technology, and vehicle's intelligent interfaces into a complete driver's environment.…”
Section: Introductionmentioning
confidence: 99%