Proceedings of the 30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conf 2020
DOI: 10.3850/978-981-14-8593-0_5778-cd
|View full text |Cite
|
Sign up to set email alerts
|

Approach to Generic Multilevel Risk Assessment of Automotive Mobile Access Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…As qualitatively described in Termin et al (2022) and criticized in Termin et al (2021), there are biases compared to the ICM: If protection and intervention are good, but observation is very poor, then the Harnser vulnerability score would be in the midrange. However, according to the ICM, the system would be highly vulnerable, because an intervention can only succeed if an attacker is detected in time -i.e.…”
Section: Introductionmentioning
confidence: 99%
“…As qualitatively described in Termin et al (2022) and criticized in Termin et al (2021), there are biases compared to the ICM: If protection and intervention are good, but observation is very poor, then the Harnser vulnerability score would be in the midrange. However, according to the ICM, the system would be highly vulnerable, because an intervention can only succeed if an attacker is detected in time -i.e.…”
Section: Introductionmentioning
confidence: 99%
“…The evaluation of security and the justified use of measures to reduce the inherent vulnerability of car security systems is perceived as a special challenge for vendors and users of mobile access systems (MAS), as usually only limited resources are available (Termin et al 2020). The concept of Performance Risk-based Integrated Security Methodology (PRISM) by the Harnser Group (2010) allows conducting a guided qualitative and semi-quantitative security analysis of physical infrastructures.…”
Section: Introductionmentioning
confidence: 99%
“…In order to enable the digital car access service, different interfaces are needed between the systemic actors, e.g. backend, mobile device and locking device (Termin et al 2020). If cars and its inventory are considered attractive for an attacker, a thorough risk analysis is required to protect the economic viability of the business model behind the MAS use case.…”
Section: Introductionmentioning
confidence: 99%