[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Cybersecurity testing for automotive domain: A survey

F Luo, X Zhang, Z Yang, Y Jiang, J Wang, M Wu… - Sensors, 2022 - mdpi.com
Modern vehicles are more complex and interconnected than ever before, which also means
that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not …

[HTML][HTML] Systematic threat assessment and security testing of automotive over-the-air (OTA) updates

S Mahmood, HN Nguyen, SA Shaikh - Vehicular Communications, 2022 - Elsevier
Modern cars host numerous special-purpose computing and connectivity devices facilitating
the correct functioning of various in-vehicle systems. These devices host complex software …

Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems

V Renganathan, E Yurtsever, Q Ahmed, A Yener - Cybersecurity, 2022 - Springer
Modern automobiles are equipped with connectivity features to enhance the user's comfort.
Bluetooth is one such communication technology that is used to pair a personal device with …

[Retracted] Software Security Testing through Coverage in Deep Neural Networks

W Fu, L Wang - Security and Communication Networks, 2022 - Wiley Online Library
With the continuous progress of society, computer technology and information technology
are also experiencing rapid development. Especially in recent years, the application of …

Investigating the Attacks and Defensive Mechanisms on Connected Vehicles (CVs)

A Ansariyar - Available at SSRN 4377737, 2022 - papers.ssrn.com
As connected vehicle (CV) technology continues to evolve and significantly develop new
capabilities, it is vital for transportation planners in different levels of management to …

The Effectiveness of Traditional Penetration Testing Methods as a Strategy to Improve Organizational Cybersecurity

R Azar - 2022 - search.proquest.com
Cyber threats continue to grow and keep pace with the increasing reliance on technology.
Penetration testing is an invaluable tool to defend an organization against these cyber …

Drivers, the missed attack surface of connected vehicles

A Adnane, J Hardy, F Ahmad, A Morris, A Filtness - 2022 - IET
The purpose of this paper is to analyse the human factors in cyberattacks targeting
connected vehicles. To achieve this purpose, we utilised qualitative research methods and …