作者
Madeline Cheah, Siraj A Shaikh, Jeremy Bryans, Hoang Nga Nguyen
发表日期
2016
研讨会论文
Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings 10
页码范围
262-269
出版商
Springer International Publishing
简介
Vehicle manufacturers routinely integrate third-party components and combining them securely into a larger system is a challenge, particularly when accurate specifications are not available. In this paper, we propose a methodology for users to introduce or strengthen security of these composed systems without requiring full knowledge of commercially sensitive sub-components. This methodology is supported by attack trees, which allow for systematic enumeration of black box components, the results of which are then incorporated into further design processes. We apply the methodology to a Bluetooth-enabled automotive infotainment unit, and find a legitimate Bluetooth feature that contributes to the insecurity of a system. Furthermore, we recommend a variety of follow-on processes to further strengthen the security of the system through the next iteration of design.
引用总数
20172018201920202021202220232121422
学术搜索中的文章
M Cheah, SA Shaikh, J Bryans, HN Nguyen - Information Security Theory and Practice: 10th IFIP WG …, 2016