Cybersecurity testing for automotive domain: A survey
F Luo, X Zhang, Z Yang, Y Jiang, J Wang, M Wu… - Sensors, 2022 - mdpi.com
Modern vehicles are more complex and interconnected than ever before, which also means
that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not …
that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not …
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
In the past years, the automotive industry has experienced a technological revolution driven
by the increasing demand of connectivity and data to develop driver-assistance systems and …
by the increasing demand of connectivity and data to develop driver-assistance systems and …
Security assessment of in-vehicle communication protocols
As the automotive industry has progressed in recent years, in-vehicle networks have also
changed. In contrast to traditional vehicles, modern vehicles communicate through …
changed. In contrast to traditional vehicles, modern vehicles communicate through …
SOME/IP intrusion detection using deep learning-based sequential models in automotive ethernet networks
Intrusion Detection Systems are widely used to detect cyberattacks, especially on protocols
vulnerable to hacking attacks such as SOME/IP. In this paper, we present a deep learning …
vulnerable to hacking attacks such as SOME/IP. In this paper, we present a deep learning …
CGFuzzer: A fuzzing approach based on coverage-guided generative adversarial networks for industrial IoT protocols
Z Yu, H Wang, D Wang, Z Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread application of the Industrial Internet of Things (IIoT), industrial control
systems (ICSs) greatly improve industrial productivity, efficiency, and product quality …
systems (ICSs) greatly improve industrial productivity, efficiency, and product quality …
SOME/IP intrusion detection system using real-time and retroactive anomaly detection
T Koyama, M Tanaka, A Miyajima… - 2022 IEEE 95th …, 2022 - ieeexplore.ieee.org
As the amount of in-vehicle data and number of in-vehicle functions have increased,
automotive Ethernet and IP-based protocols have been adopted in vehicles. The scalable …
automotive Ethernet and IP-based protocols have been adopted in vehicles. The scalable …
Security analysis and improvement of vehicle Ethernet SOME/IP protocol
J Du, R Tang, T Feng - Sensors, 2022 - mdpi.com
The combination of in-vehicle networks and smart car devices has gradually developed into
Intelligent Connected Vehicles (ICVs). Through the vehicle security protocol, ICVs can …
Intelligent Connected Vehicles (ICVs). Through the vehicle security protocol, ICVs can …
A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols
A Marchetto - SN Computer Science, 2024 - Springer
Software implementations of communication protocols connect systems and services by
allowing them to exchange data and information. The increasing request of secure …
allowing them to exchange data and information. The increasing request of secure …
Intrusion Detection System Based on Sequential Model in SOME/IP
Y Kang, D Pi, H Kim, S Lee, HK Kim - Journal of The Korea Institute …, 2022 - koreascience.kr
Abstract Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in
a modern vehicle, and the amount of data exchange between ECUs increases rapidly …
a modern vehicle, and the amount of data exchange between ECUs increases rapidly …
Review on fuzz testing for protocols in industrial control systems
H Lan, Y Sun - 2021 IEEE Sixth International Conference on …, 2021 - ieeexplore.ieee.org
The most significant advantage of fuzz testing is that it can detect security vulnerabilities in
industrial control system (ICS) protocols with lower time, labor and economic costs …
industrial control system (ICS) protocols with lower time, labor and economic costs …