Downloads provided by UsageCounts
We report on experiences of IEC 62443 and Common Criteria security certification and penetration testing. This includes, based on examples, typical vulnerabilities that we were able to exploit. For instance, in a blackbox testing of a communication dongle we were able to extract data such as a vehicle identification numbers from unencrypted bluetooth, access lightning control via OBD-II and upload of malicious files to the customer servers.
Security
Security
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 30 | |
| downloads | 20 |

Views provided by UsageCounts
Downloads provided by UsageCounts