2018
DOI: 10.1007/978-3-319-99229-7_27
|View full text |Cite
|
Sign up to set email alerts
|

Counter Attacks for Bus-off Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The authors described a two-pronged countermeasure in which a node that observes F1 followed by F2 determines a bus-off attack is in progress. Others have used the same approach [32], [33].…”
Section: Bus-off Attack Countermeasuresmentioning
confidence: 99%
“…The authors described a two-pronged countermeasure in which a node that observes F1 followed by F2 determines a bus-off attack is in progress. Others have used the same approach [32], [33].…”
Section: Bus-off Attack Countermeasuresmentioning
confidence: 99%
“…In 2018, Iehira et al [3] leveraged bus-off attack in the lab environment to completely prevent the transmission of regular messages sent from a target electronic control unit (ECU) even if the target ECU itself is not compromised. Around the same time, Souma et al [4] introduced counter attack as a potential countermeasure such that the node initiated bus-off attack itself falls into bus-off mode before the target node does. Later, this counter attack strategy was improved by Takada er al.…”
Section: A Related Workmentioning
confidence: 99%
“…We analyze the case with closed loop attacker with the system model defined in (4). Under the dominant attack strategy, the controller's objective function reduces to:…”
Section: A Optimal Control With Closed-loop Attackermentioning
confidence: 99%
See 1 more Smart Citation