Skip to main content
. 2022 Nov 26;22(23):9211. doi: 10.3390/s22239211

Table 6.

Comparison of various vulnerability scanning methods.

Aspect Static/Dynamic Code Analysis Communication Service Scanning
Wired Wireless
Time Long Medium Low
Cost High Medium Low
Test scope Application source code Wired communication
(In-vehicle network)
Wireless communication
(Bluetooth, Wi-Fi, cellular)
Limitation Source code required Physical contact required Physical contact not required