Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems
Abstract
References
Index Terms
- Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems
Recommendations
Denial of service attacks and defenses in decentralized trust management
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive ...
Off-Path Attacks Against PKI
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityThe security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak attacker, namely, an off-path attacker, can effectively subvert ...
Securing decentralized reputation management using TrustGuard
Special issue: Security in grid and distributed systemsReputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/93d3c4ea-78da-4778-b954-d6418733fb7d/3689936.cover.jpg)
- General Chair:
- Mario Fritz,
- Program Chairs:
- Christoph Krauß,
- Hans-Joachim Hof
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- German Federal Ministry of Education and Research
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 88Total Downloads
- Downloads (Last 12 months)88
- Downloads (Last 6 weeks)29
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in