SwePub
Sök i LIBRIS databas

  Extended search

WFRF:(Ebrahimi S.)
 

Search: WFRF:(Ebrahimi S.) > (2020-2024) > A Systematic Approa...

A Systematic Approach to Automotive Security

Ebrahimi, M. (author)
Graz University of Technology, Graz, Austria
Marksteiner, Stefan (author)
Mälardalens universitet,Inbyggda system,AVL List GmbH, Graz, Austria
Ničković, D. (author)
AIT Austrian Institute of Technology, Vienna, Austria
show more...
Bloem, R. (author)
Graz University of Technology, Graz, Austria
Schögler, D. (author)
AVL List GmbH, Graz, Austria
Eisner, P. (author)
AVL List GmbH, Graz, Austria
Sprung, S. (author)
AVL List GmbH, Graz, Austria
Schober, T. (author)
AVL List GmbH, Graz, Austria
Chlup, S. (author)
AIT Austrian Institute of Technology, Vienna, Austria
Schmittner, C. (author)
AIT Austrian Institute of Technology, Vienna, Austria
König, S. (author)
AIT Austrian Institute of Technology, Vienna, Austria
show less...
 (creator_code:org_t)
2023-03-03
2023
English.
In: Lecture Notes in Computer Science, vol 14000. - Cham : Springer Science and Business Media Deutschland GmbH. - 9783031274800 ; , s. 598-609
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • We propose a holistic methodology for designing automotive systems that consider security a central concern at every design stage. During the concept design, we model the system architecture and define the security attributes of its components. We perform threat analysis on the system model to identify structural security issues. From that analysis, we derive attack trees that define recipes describing steps to successfully attack the system’s assets and propose threat prevention measures. The attack tree allows us to derive a verification and validation (V &V) plan, which prioritizes the testing effort. In particular, we advocate using learning for testing approaches for the black-box components. It consists of inferring a finite state model of the black-box component from its execution traces. This model can then be used to generate new relevant tests, model check it against requirements, and compare two different implementations of the same protocol. We illustrate the methodology with an automotive infotainment system example. Using the advocated approach, we could also document unexpected and potentially critical behavior in our example systems. 

Subject headings

NATURVETENSKAP  -- Data- och informationsvetenskap -- Programvaruteknik (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Software Engineering (hsv//eng)

Keyword

Cybersecurity
Attack tree
Automotive Systems
Automotives
Black-box components
Concept designs
Cyber security
Design stage
Security attributes
Systems architecture
Threat
Black-box testing
Automotive
Testing
Threats

Publication and Content Type

ref (subject category)
kon (subject category)

Find in a library

To the university's database

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view