Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427278
|View full text |Cite
|
Sign up to set email alerts
|

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…These methods enable computations to be carried out beyond the trusted scope of the data sources, while still maintaining the confidentiality of the data [70,17,56]. This growing interest in encryption-based approaches is a response to their potential to offer stronger and more reliable privacy protections in the field of machine learning [66,65,64,57].…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…These methods enable computations to be carried out beyond the trusted scope of the data sources, while still maintaining the confidentiality of the data [70,17,56]. This growing interest in encryption-based approaches is a response to their potential to offer stronger and more reliable privacy protections in the field of machine learning [66,65,64,57].…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…However, Fig 6b clearly shows that the model categories are not entirely delimited by their triangle configuration: for example, models in Kaczmarczyck et al [27], Noor et al [34] and Xiao et al [48] have similar, central triangle placements even though they are members of the deep learning, statistical and respectively simulation categories. Furthermore, even though their topics are also different, namely automated malware family identification, illustrating a mechanism for key distribution on automotive networks and analysing the forensic validity of approximated audit logs, they all obtain a more balanced configuration by introducing qualitative reasoning about their inner workings.…”
Section: Simulation Modelsmentioning
confidence: 99%
“…Weaknesses in communication protocols [18] can be exploited to intercept or alter data flow between RL agents and their environments, compromising the decision-making process. The dependence on wireless communications exposes RL systems to spectrum-based attacks [30,43,41,42], such as jamming or spoofing [29], potentially crippling their functionality. Moreover, the involvement of untrusted or compromised service providers magnifies the threat landscape, facilitating malicious activities like data tampering or unauthorized data access [45,7,6].…”
Section: Adversarial Examples Attack and Defensementioning
confidence: 99%