%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEEIEEE Access;2019;7; ;10.1109/ACCESS.2019.2943837Cyber-securitydigital forensicsphysical attacksprivacy attacksremote attacksreverse engineeringSkoda OctaviaCyber-Security Internals of a Skoda Octavia vRS: A Hands on ApproachColin UrquhartXavier BellekensChristos TachtatzisRobert AtkinsonHanan HindyAmar Seeam
IEEE Access146057 2019710.1109/ACCESS.2019.2943837146069
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>/ProcSet[/PDF/Text]/ColorSpace<>/Font<>>>/MediaBox[0 0 576 782.929]/Annots[17 0 R 18 0 R 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R 24 0 R]/Rotate 0>>
endobj
4 0 obj
<>
endobj
5 0 obj
<>stream
HWms۸+Hu,w>u{wƊ3qȚ"})ZFr.9' 2qHēN~p~pO种Fsb%9~PƳp7b3l2P
=
UYxn̽9nY|4p5w͠M?݊|Pϕxt6<^wiU^-98!b KNB= jgN"C1ͽ=:}Xvq4 Old