2020
DOI: 10.12700/aph.17.1.2020.1.8
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Novel Automotive Cybersecurity, Integrity Level, Framework

Abstract: As automated driver assistance functions are getting more and more popular, they will surly have a significant impact on our life especially considering security and the expected serious effects of malicious interventions. In light of the introduced aspects, the Test Field of Zalaegerszeg has started a research to evaluate the required professional and scientific framework to prevent transport systems from malicious external intervention. With regard to this aspect, the homologation system has been analyzed. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…The main concept of this threat modeling approach is to analyze each component of the whole system for susceptibility to threats and mitigation for all threats to each component in order to claim that the system is secure. 24,25 Accordingly, threat modeling aims to analyze:…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The main concept of this threat modeling approach is to analyze each component of the whole system for susceptibility to threats and mitigation for all threats to each component in order to claim that the system is secure. 24,25 Accordingly, threat modeling aims to analyze:…”
Section: Security Analysismentioning
confidence: 99%
“…• possible mitigation of the attacks to be detected and treated in case of each component, in order to estimate and improve the security level of the system. 24,25 Threat modeling is a base stone of cybersecurity, an indispensable activity that should be performed in application development and system evaluation processes. It helps developers to make proactive architectural decisions that reduce threats from the start.…”
Section: Security Analysismentioning
confidence: 99%