2020
DOI: 10.1007/978-3-030-49443-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…In the context of automotive systems, threat modeling plays a crucial role in ensuring the safety and security of vehicles and their associated technologies [190,191]. As technology continues to advance, vehicles are becoming increasingly interconnected and reliant on software, making them more susceptible to cyber threats [192,193]. Threat modeling helps organizations proactively identify and mitigate potential risks, minimizing the likelihood of successful attacks and their potential impact.…”
Section: Threat Modelingmentioning
confidence: 99%
“…In the context of automotive systems, threat modeling plays a crucial role in ensuring the safety and security of vehicles and their associated technologies [190,191]. As technology continues to advance, vehicles are becoming increasingly interconnected and reliant on software, making them more susceptible to cyber threats [192,193]. Threat modeling helps organizations proactively identify and mitigate potential risks, minimizing the likelihood of successful attacks and their potential impact.…”
Section: Threat Modelingmentioning
confidence: 99%
“…Some researchers have investigated the combined use of threat modeling and attack simulations in domains such as energy [51] and vehicular IT [27,57]. CySeMoL [45] is a cyber security modeling language for enterprise-level system architectures; P 2 CySeMoL [19], which is further development of CySeMoL, is an attack graph tool for estimating the cyber security of EAs.…”
Section: Attack Simulationsmentioning
confidence: 99%
“…e threat model in SecuriCAD is mainly composed of three components: host, network, and attacker. Figure 7 is a partial model of the 2015 Cadillac Escalade vehicle network constructed by Xiong et al [38], where host mainly refers to ECUs and network includes CAN, LIN, MOST, and ethernet. ese are the assets that need to be protected in the system.…”
Section: Threat Analysis and Risk Assessment Toolsmentioning
confidence: 99%