It is essential to note that cybersecurity threats not only arise from inherent protocol defects but also consider software implementation vulnerabilities.
But unfortunately, automotive cybersecurity researchers hardly produce a comprehensive detection method due to the confidential nature of Controller Area Network (CAN) DBC format files, which is a standard long maintained by car manufacturers.