2018
DOI: 10.1177/0361198118794057
|View full text |Cite
|
Sign up to set email alerts
|

Spatially Clustered Autonomous Vehicle Malware: Producing New Urban Geographies of Inequity

Abstract: Malicious software (malware) is both a hurdle to autonomous vehicle (AV) adoption and a serious threat to AV occupant safety. Yet, to date, the topic of how subnational transportation decision makers should handle this cybersecurity threat has been underexplored. This paper describes how malware can spread through vehicle-to-X networks and infect AVs to a non-technical planning audience. It then explains how AV malware can cluster spatially in linguistic, socioeconomic, and political enclaves of American citie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…1, it also leads to a giant system consisting of tremendous processes interacting with each other to perform complex functions, including sensing, data processing, localization, route planning, motion control, trajectory control, etc., which makes it vulnerable to malware, software failures, or even a kernel panic [1], [2], [39], [40]. For example, malware can be remotely distributed into selfdriving cars [6], [23] to disrupt system execution or intrude the in-vehicle bus. Thus, it is urgent and necessary to decouple and isolate each functionality.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…1, it also leads to a giant system consisting of tremendous processes interacting with each other to perform complex functions, including sensing, data processing, localization, route planning, motion control, trajectory control, etc., which makes it vulnerable to malware, software failures, or even a kernel panic [1], [2], [39], [40]. For example, malware can be remotely distributed into selfdriving cars [6], [23] to disrupt system execution or intrude the in-vehicle bus. Thus, it is urgent and necessary to decouple and isolate each functionality.…”
Section: Motivationmentioning
confidence: 99%
“…(2) implant malware to interfere the system execution, such as consuming available resources, sending fabricated control commands, or even disrupting critical services to cause system failures, which are frequently used in remote attacks [3], [6]. Software vulnerabilities may also trigger abnormal execution and lead to failures.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation