“…For example, attackers can compromise the repositories that host the software updates, as described by Kuppusamy et al in [20]. Various testing methods (for example, [2], [3], [6]- [8], [11], [12], [15], [22], [29]) and testing environments (e.g., [10], [13], [32], [35], [36]) have been proposed for the security testing of automotive systems. These testbeds and techniques have been designed primarily for discovering security flaws in vehicular networks (e.g., CAN, MOST, LIN, etc.…”