now become a possibility and concrete threat. Prior works on automotive cyber security
solutions have primarily focused evaluation either on real cars or via emulations of
electronic control units (ECUs). Evaluation on real cars offers limited flexibility in
manoeuvring the packets communicated through in-vehicle network (IVN). Meanwhile,
emulations of ECUs rely on assumptions that may not correspond to the exact features in an …