2023
DOI: 10.1016/j.trf.2023.02.002
|View full text |Cite
|
Sign up to set email alerts
|

The notorious B.I.T: The effects of a ransomware and a screen failure on distraction in automated driving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 32 publications
(37 reference statements)
0
3
0
Order By: Relevance
“…Nonetheless, challenges remain in balancing scalability and authenticity -easily deployed honeypots tend to be less deceptive to humandirected ransomware [2,57]. Developing customizable, dynamic decoys indistinguishable from genuine data at scale is an open problem [28,58]. Moreover, data exfiltration prior to encryption leaves minimal time between decoy-based detection and actual data loss [59,16].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Nonetheless, challenges remain in balancing scalability and authenticity -easily deployed honeypots tend to be less deceptive to humandirected ransomware [2,57]. Developing customizable, dynamic decoys indistinguishable from genuine data at scale is an open problem [28,58]. Moreover, data exfiltration prior to encryption leaves minimal time between decoy-based detection and actual data loss [59,16].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…Thus, traditional decoy file strategies have managed to capture threats but largely failed to prevent actual data breaches [27]. This underscores the need for more intelligent and high-interaction decoys that lure malware into engaging more deeply before exposing itself [28].…”
Section: Introductionmentioning
confidence: 99%
“…Many problems are possible due to the failure of display devices. In [9], the authors studied the effects of screen failure on driving performance in automated cars. They found that after the failure, objective trust declined, drivers took over more frequently, and lateral vehicle control was compromised.…”
Section: A Components Of Adasmentioning
confidence: 99%
“…The data is then slowly and stealthily funneled out of the organization over an extended period using encrypted communication channels to cloud storage sites controlled by the attackers [9]. With terabytes of sensitive data successfully extracted from the compromised network, the ransomware gangs demand sizable cryptocurrency payments in exchange for assurances the stolen data will not be made public [10][11][12]. The exfiltrated information often contains trade secrets, financial records, personal information, or other sensitive data that could prove catastrophically damaging if leaked [13].…”
Section: Introductionmentioning
confidence: 99%