As a target for attacks
MaCySTe reproduces the network infrastructure of a real bridge.
As a result, attacks can overhear and inject data as if they were acting in a real environment.
We provide two sample attacks:
MaCySTe reproduces the network infrastructure of a real bridge.
As a result, attacks can overhear and inject data as if they were acting in a real environment.
We provide two sample attacks: