2020
DOI: 10.3390/fi12110198
|View full text |Cite
|
Sign up to set email alerts
|

On the Modeling of Automotive Security: A Survey of Methods and Perspectives

Abstract: As the intelligent car-networking represents the new direction of the future vehicular development, automotive security plays an increasingly important role in the whole car industry chain. On condition that the accompanying problems of security are proofed, vehicles will provide more convenience while ensuring safety. Security models can be utilized as tools to rationalize the security of the automotive system and represent it in a structured manner. It is essential to improve the knowledge about security mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 52 publications
0
10
0
Order By: Relevance
“…Threat models for the previous generation of the automotive industry are targeted for automotive E/E architecture, which are either adapted from IT and software industry (e.g., Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE) [34], confidentiality, integrity, and availability (CIA) [35] threat, vulnerability and risk assessment (TVRA) [36], E-safety vehicle intrusion protected applications (EVITA) [37], and healing vulnerabilities to enhance software security and safety (HEAVENS)) [24] or heavily influenced by safety analysis models such as fault tree analysis, Hazard Analysis and Risk Assessment (e.g., security-aware hazard analysis and risk assessment (SAHARA)) [38]. In 2021, the ISO/SAE 21434 standard was published for Road Vehicles-Cybersecurity Engineering, which included EVITA, HEAV-ENS, and TVRA in recommendations for automotive threat modeling.…”
Section: A Threat Analysis Methods In Practice For Automotivementioning
confidence: 99%
“…Threat models for the previous generation of the automotive industry are targeted for automotive E/E architecture, which are either adapted from IT and software industry (e.g., Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE) [34], confidentiality, integrity, and availability (CIA) [35] threat, vulnerability and risk assessment (TVRA) [36], E-safety vehicle intrusion protected applications (EVITA) [37], and healing vulnerabilities to enhance software security and safety (HEAVENS)) [24] or heavily influenced by safety analysis models such as fault tree analysis, Hazard Analysis and Risk Assessment (e.g., security-aware hazard analysis and risk assessment (SAHARA)) [38]. In 2021, the ISO/SAE 21434 standard was published for Road Vehicles-Cybersecurity Engineering, which included EVITA, HEAV-ENS, and TVRA in recommendations for automotive threat modeling.…”
Section: A Threat Analysis Methods In Practice For Automotivementioning
confidence: 99%
“…However, STRIDE can also be used for CPS analysis and development due to its generic and modular nature. STRIDE-specific threat modeling methods and approaches, also in the context of CPS development, are discussed in previous studies, for example, 29,31,43,45 and previous works 21,24,34,41,44,46,47 compare aspects and characteristics of various threat modeling approaches and methods.…”
Section: Selecting a Threat Modeling Methodsmentioning
confidence: 99%
“…In this context, further methods exist. The STRIDE model (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege) is a qualitative approach by Microsoft using a system’s DFD as the base for an evaluation [ 35 ]. Security-related system properties are labeled and checked regarding security characteristics, and threats are identified.…”
Section: Background and State Of The Artmentioning
confidence: 99%
“…HEAVENS includes authenticity, authorization, non-repudiation, privacy, and freshness, on top of the previously mentioned attributes. It evaluates the whole E/E architecture and provides a risk matrix as a result that includes threat as well as impact levels, but also high-level security requirements [ 35 ]. The extension HEAVENS 2.0 is improved according to gaps that could be identified when comparing HEAVENS 1.0 to the requirements of ISO/SAE 21434.…”
Section: Background and State Of The Artmentioning
confidence: 99%
See 1 more Smart Citation