Proceedings of the 2016 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2016
DOI: 10.3850/9783981537079_0361
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Impact of Injected Sensor Data on an Advanced Driver Assistance System using the OP2TIMUS Prototyping Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Cyberattacks usually aim to damage or breach a security objective, such as confidentiality, integrity, and availability of assets or a combination of these security objectives. For example, when an attacker intends to monitor the traffic of data, violating the confidentiality of the data, the attacker also needs to breach the authentication of the connection; when an attacker gets unauthorized access to the storage of data and tampers with the stored data, this is violating the integrity and confidentiality of the data, and the impact of this attack might be on system resources in the form of increasing energy consumption or draining processor capabilities [89], [129]. A cyber-attack could produce severe consequences, e.g., the damage of all systems connected to the targeted system.…”
Section: ) Impact Of Cyber Attacksmentioning
confidence: 99%
“…Cyberattacks usually aim to damage or breach a security objective, such as confidentiality, integrity, and availability of assets or a combination of these security objectives. For example, when an attacker intends to monitor the traffic of data, violating the confidentiality of the data, the attacker also needs to breach the authentication of the connection; when an attacker gets unauthorized access to the storage of data and tampers with the stored data, this is violating the integrity and confidentiality of the data, and the impact of this attack might be on system resources in the form of increasing energy consumption or draining processor capabilities [89], [129]. A cyber-attack could produce severe consequences, e.g., the damage of all systems connected to the targeted system.…”
Section: ) Impact Of Cyber Attacksmentioning
confidence: 99%