2016 IEEE Vehicular Networking Conference (VNC) 2016
DOI: 10.1109/vnc.2016.7835940
|View full text |Cite
|
Sign up to set email alerts
|

Formal models for automotive systems and vehicular networks: Benefits and challenges

Abstract: Formal models have seen widespread use in the development of safety-and security-critical systemsprimarily as a means of providing increased assurance. In particular, formal models of threats have the potential to give rise to numerous benefits: they can help in the understanding of vulnerabilities (and the communication of such); they also provide a means by which these vulnerabilities can be reasoned about. We give consideration to how formal models of threats might be beneficial in the development of modern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 22 publications
2
4
0
Order By: Relevance
“…It should be noted that, when we simulate the delivery process, the Hurst index value, close to H ≈ 0.5, is the limiting value for the Pareto flow, because if H ≥ 0.5, dispersion for this distribution is not determined [21] (Figure 9), therefore the simulated results of the delivery process obtained at these H values will be wrong. Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
See 2 more Smart Citations
“…It should be noted that, when we simulate the delivery process, the Hurst index value, close to H ≈ 0.5, is the limiting value for the Pareto flow, because if H ≥ 0.5, dispersion for this distribution is not determined [21] (Figure 9), therefore the simulated results of the delivery process obtained at these H values will be wrong. Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
“…In the case of the availability and implementation of an information impact by an attacker on network elements, the probability of the successful delivery of data packets in a given time significantly worsens (Figure 10). Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
See 1 more Smart Citation
“…Security engineering (and security testing as part of that process) is still relatively novel in mainstream automotive production [3,4], and typically security is incidental and a by-product of achieving performance and safety goals [5,6,7,8]. Even with advanced formal methods for modelling and testing, the need for and number of demands, features and increased connecting power means that, even had security been considered, the scale of the problem facing security testers is now much broader [9].…”
Section: Introductionmentioning
confidence: 99%
“…While we recognise penetration testing's role, we believe that there is the potential for other security testing approaches to play a complementary role, with one candidate being the testing of a system's security from models -in short, model-based security testing. Thus, the focus of this paper, which builds upon the initial work described in [3], is on answering how might a model-based testing (MBT) framework support the automatic security testing of a modern car's subsystems? This work falls into the category of formal and model-driven approaches to engineering safety-critical and security-critical systems.…”
Section: Introductionmentioning
confidence: 99%