Table 6.
Comparison of various vulnerability scanning methods.
Aspect | Static/Dynamic Code Analysis | Communication Service Scanning | |
---|---|---|---|
Wired | Wireless | ||
Time | Long | Medium | Low |
Cost | High | Medium | Low |
Test scope | Application source code | Wired communication (In-vehicle network) |
Wireless communication (Bluetooth, Wi-Fi, cellular) |
Limitation | Source code required | Physical contact required | Physical contact not required |