Research Article

Enhanced Android App-Repackaging Attack on In-Vehicle Network

Table 2

Cyber Kill Chain phases and characteristics.

PhaseAction

ReconnaissanceIdentify the target
WeaponizationPrepare the operation
DeliveryLaunch the operation
ExploitationGain access to victim
InstallationEstablish beachhead at the victim
Command and ControlRemotely control the implants
Actions on ObjectivesAchieve the mission’s goal