Today, security can no longer be treated as a secondary issue in embedded and cyber- physical systems. Therefore, one of the main challenges in these domains is the design of …
J Mehta, G Richard, L Lugosch, D Yu… - ACM Transactions on …, 2023 - dl.acm.org
The controller area network (CAN) protocol, used in many modern vehicles for real-time inter- device communications, is known to have cybersecurity vulnerabilities, putting passengers …
N Vreman, M Maggio - Proceedings of the Workshop on Fog Computing …, 2019 - dl.acm.org
Modern control algorithms are frequently implemented in a distributed and decentralized way. Multiple fog devices communicate using paradigms borrowed from the Internet-of …
With cyber-physical systems opening to the outside world, security can no longer be considered a secondary issue. In this work, we focus on security threats to control …