Login / Signup

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.

Alvise de Faveri TronStefano LongariMichele CarminatiMario PolinoStefano Zanero
Published in: CoRR (2022)
Keyphrases
  • computer systems
  • network structure
  • response time
  • intrusion detection system
  • wireless communication