2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI) 2016
DOI: 10.1109/iiai-aai.2016.95
|View full text |Cite
|
Sign up to set email alerts
|

A Proposal of Security Requirements Definition Methodology in Connected Car Systems by CVSS V3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 0 publications
1
4
0
Order By: Relevance
“…Bajpai et al also demonstrate that the Common Vulnerability Scoring Systems (CVSS) [58] from classical IT can easily be adapted for the severity evaluation of automotive vulnerabilities. Other works by FFRI Inc. [59] and Ando et al [60] reach similar conclusions. In addition, the new ISO/IEC 21434 recommends the CVSS Exploitability metric for the evaluation of automotive attack feasibility.…”
Section: Related Discussionsupporting
confidence: 82%
“…Bajpai et al also demonstrate that the Common Vulnerability Scoring Systems (CVSS) [58] from classical IT can easily be adapted for the severity evaluation of automotive vulnerabilities. Other works by FFRI Inc. [59] and Ando et al [60] reach similar conclusions. In addition, the new ISO/IEC 21434 recommends the CVSS Exploitability metric for the evaluation of automotive attack feasibility.…”
Section: Related Discussionsupporting
confidence: 82%
“…In this framework, the severity of different attack paths and efficiency of security strategies particularly at the device level is calculated, to prioritize the devices in terms of securing them. In a similar work, Ando et al (2016) performed the risk analysis of smart car sensors using a tree model with 5Ws (why, who, where, what, when) and CVSSv3 vector string. This study lacked mathematical analyses and the real-environmental case studies.…”
Section: Vulnerability Databases (National Vulnerabilitymentioning
confidence: 99%
“…This helps to prioritize which devices should be protected first. In the case study presented in [15], probabilities are assumed and numerical representation of a probability associated with devices is unexplored.…”
Section: Related Workmentioning
confidence: 99%
“…In [15], Ando proposed a theoretical mythology to analyse the risk of connected IoT cars sensors by mapping the vulnerability vector of CVSS v3 into a 5W-tree model (who, what, when, where, why). However, real-world case studies and detailed mathematical and experimental analyses are necessary before adopting such a methodology.…”
Section: Related Workmentioning
confidence: 99%