Skip to main content
. 2022 Nov 26;22(23):9211. doi: 10.3390/s22239211

Table 7.

A comparative overview of penetration testing in the surveyed literature.

Literature Year Attack Vector Attack Type Knowledge Level
Koscher [26] 2010 OBD,
CAN,
ECU
Sniffing, DoS,
reverse engineering,
unauthorized access,
ECU tampering,
injection attack
Miller [30] 2013 OBD,
CAN,
ECU
Sniffing, DoS,
injection attack,
diagnostic attack,
firmware extraction/modification,
ECU tampering,
detecting attacks
Shoukry [31] 2013 ABS wheel
speed sensors
Spoofing, tampering,
injection attack
Woo [32] 2015 OBD,
CAN,
Mobile app,
Bluetooth
Sniffing, DoS,
replay attack,
wireless attack,
malicious app installation
Petit [33] 2015 Sensors Blinding attack,
jamming attack,
replay attack
relay attack, spoofing
Abbott-McCune [34] 2016 OBD,
CAN
Sniffing, DoS,
replay attack
Mazloom [27] 2016 IVI Data extraction,
reverse engineering,
heap overflow attack,
malicious code injection
Yan [28] 2016 Sensors Jamming attack,
spoofing
Nie [35] 2017 Wi-Fi,
cellular,
CAN
Privilege escalation,
Unauthorized access,
ECU tampering,
reverse engineering,
injection attack
Cheah [36] 2017 Bluetooth Sniffing, DoS,
data extraction,
injection attack
Shin [29] 2017 Lidar Channel attack
Milburn [37] 2018 CAN
debug interfaces,
ECU
Firmware extraction/modification,
fault injection
Jeong [38] 2018 Keyless entry Relay attack
Dürrwang [39] 2018 Airbag ECU Diagnostic attack,
signal tampering
Sommer [40] 2019 In-vehicle network Eavesdropping,
reverse engineering
He [41] 2020 GNSS Spoofing,
jamming attack
Zachos [42] 2020 OBD,
CAN
Spoofing,
diagnostic attack
He [43] 2020 OTA Sniffing, DoS, spoofing,
tampering, replay attack,
unauthorized access,
reverse engineering
Wen [44] 2020 Wireless OBD dongle Spoofing,
eavesdropping,
injection attack
Ebert [16] 2021 Ethernet,
IVI
DoS, spoofing,
eavesdropping,
malicious code injection
🞕

■ = Black box, 🞕 = Grey box.