2017
DOI: 10.1007/978-3-319-66284-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…In phases 2 and 3 of the TP15002 procedure, Kawanishi et al promoted an efficient risk evaluation method in [15] [17]. They presented the following three ideas:  2-step risk evaluation: Procedures in phases 2 and 3 are divided into 2 processes respectively to minimize the amount of work done by security specialists and reduce the total cost.…”
Section: Ideas For Efficient Risk Evaluation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In phases 2 and 3 of the TP15002 procedure, Kawanishi et al promoted an efficient risk evaluation method in [15] [17]. They presented the following three ideas:  2-step risk evaluation: Procedures in phases 2 and 3 are divided into 2 processes respectively to minimize the amount of work done by security specialists and reduce the total cost.…”
Section: Ideas For Efficient Risk Evaluation Methodsmentioning
confidence: 99%
“…By writing out all of these combinations, all possible threats to the TOE, specifically "the threat of where an attacker invades and which asset in which module is attacked," are also covered. Kawanishi et al introduced this to guarantee of threat coverage in [15]. In order to ensure completeness and perform risk analysis, a quantification method that does not include factors such as the attacker's motive or environment in the evaluation criteria is suitable, for example, CRSS and our method RSS-CWSS_CPS described later.…”
Section: Ideas For Efficient Risk Evaluation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…e Japanese Automotive Standard Organization (JASO) published the TP15002 guideline to standardize the procedures of the security design in the early stage of the development [12]. Kawanishi et al proposed better solutions for security evaluation based on TP15002 [13,14]. e E-safety Vehicle Intrusion Protected Application (EVITA) project, funded by European Union, designed, verified, and prototyped a security architecture for in-vehicle networks where securityrelevant components and data are pretested against unauthorized access.…”
Section: Cybersecurity Designmentioning
confidence: 99%
“…This paper is an extended version of [1], which appeared in the proceedings of the DECSoS 2017 Workshop.…”
Section: Appendixmentioning
confidence: 99%