Assume that a self-driving, software-driven (for example the “Tesla”) car connects to conventional computer networks for communication and update purposes. (a) Explain how the Separation of Duty principle could be applied to prevent an attacker from installing a malware program on the software within the car. Include any limitations to your approach. (b) Next, Bob has a special mobile application that communicates wirelessly with his car using keystream xor encrypted messages, and Bob’s spouse happens to use the same application on a separate device.
Assume that a self-driving, software-driven (for example the “Tesla”) car connects to conventional
(a) Explain how the Separation of Duty principle could be applied to prevent an attacker from installing a malware program on the software within the car. Include any limitations to your approach.
(b) Next, Bob has a special mobile application that communicates wirelessly with his car using keystream xor encrypted messages, and Bob’s spouse happens to use the same application on a separate device.
Notably, the application uses the same keystream bits for both Bob and his spouse, since they both use the car. Explain any attacks you can conceive against their car keys/car.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps