2017
DOI: 10.1007/978-3-319-66266-4_22
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Pattern Approach for Safety and Security Co-engineering in the Automotive Domain

Abstract: Future automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or baneit greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cyberse curity becomes important as additional concern because attacks are now much more likely and severe. Unfortunately, there is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…Moving forward, we are working with our industrial collaborators to expand the security pattern repository, including making use of taxonomies of automotive security attacks [54]. We are also exploring how the security patterns can be incorporated into security and safety-focused development processes, similar to that proposed by Amorim et al [47]. We are also exploring socio-technical approaches to securing automotive cybersecurity vulnerabilities [68].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moving forward, we are working with our industrial collaborators to expand the security pattern repository, including making use of taxonomies of automotive security attacks [54]. We are also exploring how the security patterns can be incorporated into security and safety-focused development processes, similar to that proposed by Amorim et al [47]. We are also exploring socio-technical approaches to securing automotive cybersecurity vulnerabilities [68].…”
Section: Discussionmentioning
confidence: 99%
“…Specifically, automotive systems face challenges with available communication protocols and the use of automotive-specific communication architecture (e.g., CAN Bus, FlexRay, LIN, MOST), limited communication resources, and stringent performance requirements for safety-critical functionality [8,45]. Despite these limitations, researchers have adapted existing security approaches to comply with automotive system's constraints, with a focus on authentication and encryption [46,47,48,49,50].…”
Section: Security Solutions For Automotive Systemsmentioning
confidence: 99%
“…T. Amorim et al provided a systematic pattern-based approach to interlink safety and security patterns. e co-engineering loop was introduced into the waterfall engineering lifecycle to analyze and solve conflicts between both sides [25]. Pereira et al presented an integrated approach, in which two teams work separately in parallel steps and then work cooperatively for integrated analysis.…”
Section: Co-designmentioning
confidence: 99%
“…Unfortunatelly the cybersecurity guidebook and SAHARA do not use models. Approaches like Cheng et al (2019); Amorim et al (2017) use models, but do not use SysML. Approaches like security by MBRE (Japs, 2020a) or SAVE (Japs, 2020b) use SysML within the context of MBSE.…”
Section: Introductionmentioning
confidence: 99%