Research Article
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Table 2
User interaction scenarios analyzed in this study.
| Category | User interaction scenario |
| Confidentiality | Information leakage (trip/location records, camera video/images, contact list, call/SMS history) | Integrity | Intentionally manipulated application installation (injection of malicious code disguised as a modified application) | Availability | Continuous resource consumption (large-scale traffic transmission) and system termination (intentionally resulting in various exception cases) |
|
|