{"title":"自动驾驶汽车的攻击和防御:一项综合研究","authors":"Boughanja Manale, T. Mazri","doi":"10.1145/3454127.3456575","DOIUrl":null,"url":null,"abstract":"Autonomous vehicles are developing at a rapid pace with increasing levels of automation and connectivity, creating new potential for a wide range of cyber attacks to improve security, protection, and detection measures to be implemented at all levels of autonomous vehicles, many efforts are being made to improve resilience to cyberattacks, and many challenges remain unresolved. This article first presents an overview of AV and then some major security attacks on connected vehicles. We review and summarize the available defenses against these attacks and categorize them into four categories, including cryptography, network security, software vulnerability detection, and malware detection.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attacks and defenses on autonomous vehicles: a comprehensive Study\",\"authors\":\"Boughanja Manale, T. Mazri\",\"doi\":\"10.1145/3454127.3456575\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Autonomous vehicles are developing at a rapid pace with increasing levels of automation and connectivity, creating new potential for a wide range of cyber attacks to improve security, protection, and detection measures to be implemented at all levels of autonomous vehicles, many efforts are being made to improve resilience to cyberattacks, and many challenges remain unresolved. This article first presents an overview of AV and then some major security attacks on connected vehicles. We review and summarize the available defenses against these attacks and categorize them into four categories, including cryptography, network security, software vulnerability detection, and malware detection.\",\"PeriodicalId\":432206,\"journal\":{\"name\":\"Proceedings of the 4th International Conference on Networking, Information Systems & Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th International Conference on Networking, Information Systems & Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3454127.3456575\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3454127.3456575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attacks and defenses on autonomous vehicles: a comprehensive Study
Autonomous vehicles are developing at a rapid pace with increasing levels of automation and connectivity, creating new potential for a wide range of cyber attacks to improve security, protection, and detection measures to be implemented at all levels of autonomous vehicles, many efforts are being made to improve resilience to cyberattacks, and many challenges remain unresolved. This article first presents an overview of AV and then some major security attacks on connected vehicles. We review and summarize the available defenses against these attacks and categorize them into four categories, including cryptography, network security, software vulnerability detection, and malware detection.