2014
DOI: 10.1007/978-3-319-13257-0_27
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Attack Forest Construction for Automotive On-board Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…e algorithm can automatically find the optimal attack path between the attacker and the asset with the aid of the system model. Reference [35] also proves that even in the worst case, this method can complete the threat analysis and security assessment of a large system within a few minutes. is is very beneficial to OEMs, who often need to perform large-scale threat analysis on vehicle systems.…”
Section: Tree-based Methodsmentioning
confidence: 86%
See 2 more Smart Citations
“…e algorithm can automatically find the optimal attack path between the attacker and the asset with the aid of the system model. Reference [35] also proves that even in the worst case, this method can complete the threat analysis and security assessment of a large system within a few minutes. is is very beneficial to OEMs, who often need to perform large-scale threat analysis on vehicle systems.…”
Section: Tree-based Methodsmentioning
confidence: 86%
“…It is inevitable that attack paths will be lost and the possibility of vehicle systems being attacked will increase, which is unacceptable to the OEMs. In response to this shortcoming of attack tree analysis, Salfer et al [35] proposed a method for automatically constructing attack forests for automotive networks for software attacks. e algorithm can automatically find the optimal attack path between the attacker and the asset with the aid of the system model.…”
Section: Tree-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As regards this, [14] mentioned all the possible attack categories and cases that can be happened for driverless vehicles. To be more specified, intrusions may occur to automotive control system, such as ECU [25], driving system components, such as sensors [1,27], and during the vehicle-to-everything communications [4,9]. Besides, outstanding defense approaches in the last decade were also discussed in the paper [11].…”
Section: Related Workmentioning
confidence: 99%
“…The foundations of formal descriptions of attacks were laid by [15] and in particular their process algebraic nature was recognised in [28]. Automotive specific attack trees have also been discussed in literature where [24] looked at attack tree generation and gave formal descriptions of the trees. This is orthogonal to our research (in translating low level attack trees) as in our case the trees have already been pre-built based on reconnaissance of a black box system, rather than the automatic generation of an attack tree from a fully specified systemunder-test (SUT).…”
Section: Attack Treesmentioning
confidence: 99%