Search: WFRF:(Ebrahimi S.)
> (2020-2024) >
A Systematic Approa...
A Systematic Approach to Automotive Security
-
- Ebrahimi, M. (author)
- Graz University of Technology, Graz, Austria
-
- Marksteiner, Stefan (author)
- Mälardalens universitet,Inbyggda system,AVL List GmbH, Graz, Austria
-
- Ničković, D. (author)
- AIT Austrian Institute of Technology, Vienna, Austria
-
show more...
-
- Bloem, R. (author)
- Graz University of Technology, Graz, Austria
-
- Schögler, D. (author)
- AVL List GmbH, Graz, Austria
-
- Eisner, P. (author)
- AVL List GmbH, Graz, Austria
-
- Sprung, S. (author)
- AVL List GmbH, Graz, Austria
-
- Schober, T. (author)
- AVL List GmbH, Graz, Austria
-
- Chlup, S. (author)
- AIT Austrian Institute of Technology, Vienna, Austria
-
- Schmittner, C. (author)
- AIT Austrian Institute of Technology, Vienna, Austria
-
- König, S. (author)
- AIT Austrian Institute of Technology, Vienna, Austria
-
show less...
-
(creator_code:org_t)
- 2023-03-03
- 2023
- English.
-
In: Lecture Notes in Computer Science, vol 14000. - Cham : Springer Science and Business Media Deutschland GmbH. - 9783031274800 ; , s. 598-609
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- We propose a holistic methodology for designing automotive systems that consider security a central concern at every design stage. During the concept design, we model the system architecture and define the security attributes of its components. We perform threat analysis on the system model to identify structural security issues. From that analysis, we derive attack trees that define recipes describing steps to successfully attack the system’s assets and propose threat prevention measures. The attack tree allows us to derive a verification and validation (V &V) plan, which prioritizes the testing effort. In particular, we advocate using learning for testing approaches for the black-box components. It consists of inferring a finite state model of the black-box component from its execution traces. This model can then be used to generate new relevant tests, model check it against requirements, and compare two different implementations of the same protocol. We illustrate the methodology with an automotive infotainment system example. Using the advocated approach, we could also document unexpected and potentially critical behavior in our example systems.
Subject headings
- NATURVETENSKAP -- Data- och informationsvetenskap -- Programvaruteknik (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences -- Software Engineering (hsv//eng)
Keyword
- Cybersecurity
- Attack tree
- Automotive Systems
- Automotives
- Black-box components
- Concept designs
- Cyber security
- Design stage
- Security attributes
- Systems architecture
- Threat
- Black-box testing
- Automotive
- Testing
- Threats
Publication and Content Type
- ref (subject category)
- kon (subject category)
Find in a library
To the university's database
- By the author/editor
-
Ebrahimi, M.
-
Marksteiner, Ste ...
-
Ničković, D.
-
Bloem, R.
-
Schögler, D.
-
Eisner, P.
-
show more...
-
Sprung, S.
-
Schober, T.
-
Chlup, S.
-
Schmittner, C.
-
König, S.
-
show less...
- About the subject
-
- NATURAL SCIENCES
-
NATURAL SCIENCES
-
and Computer and Inf ...
-
and Software Enginee ...
- Articles in the publication
-
Lecture Notes in ...
- By the university
-
Mälardalen University