Attack tree construction and its application to the connected vehicle

K Karray, JL Danger, S Guilley… - Cyber-Physical Systems …, 2018 - Springer
Remote connectivity of today's and future cars increases their capabilities of autonomy and
safety, but also their attack surface, as reported by several research papers. In the …

THREATGET: towards automated attack tree analysis for automotive cybersecurity

S Chlup, K Christl, C Schmittner, AM Shaaban… - Information, 2022 - mdpi.com
The automotive domain is moving away from simple isolated vehicles to interconnected
networks of heterogeneous systems forming a complex transportation infrastructure. The …

Model-based attack tree generation for cybersecurity risk-assessments in automotive

M Kern, B Liu, VP Betancourt… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Networked and highly automated driver assistance systems require interfaces to the outside
world and within the vehicle. These can potentially be used for cybersecurity attacks …

A template-based method for the generation of attack trees

J Bryans, LS Liew, HN Nguyen… - … Security Theory and …, 2020 - Springer
Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in
which an attack can be carried out. Attack trees can become large, and developing them by …

Automotive cybersecurity: Foundations for next-generation vehicles

M Scalas, G Giacinto - … on new Trends in Computing Sciences …, 2019 - ieeexplore.ieee.org
The automotive industry is experiencing a serious transformation due to a digitalisation
process and the transition to the new paradigm of Mobility-as-a-Service. The next …

Threat modeling and attack simulations of connected vehicles: Proof of concept

W Xiong, F Krantz, R Lagerström - … Czech Republic, February 23-25, 2019 …, 2020 - Springer
A modern vehicle contains over a hundred Electronic Control Units (ECUs) that
communicate over in-vehicle networks, and can also be connected to external networks …

A review on automatic generation of attack trees and its application to automotive cybersecurity

K Sowka, V Palade, H Jadidbonab… - Artificial Intelligence and …, 2023 - Springer
A comprehensive cybersecurity evaluation of automotive on-board networks has become a
crucial antecedent to the commercial distribution of vehicles. However, the means to perform …

Efficient attack forest construction for automotive on-board networks

M Salfer, H Schweppe, C Eckert - … , ISC 2014, Hong Kong, China, October …, 2014 - Springer
Software-intensive, modern vehicles comprise about 100 computers, which allow a plethora
of attack combinations. This paper proposes an efficient attack forest construction method for …

Attack trees: a notion of missing attacks

S Pinchinat, B Fila, F Wacheux… - Graphical Models for …, 2019 - Springer
Attack trees are widely used for security modeling and risk analysis. Classically, an attack
tree combines possible actions of the attacker into attacks. In most existing approaches, an …

Guided design of attack trees: a system-based approach

M Audinot, S Pinchinat, B Kordy - 2018 IEEE 31st Computer …, 2018 - ieeexplore.ieee.org
Attack trees are a well-recognized formalism for security modeling and analysis, but in this
work we tackle a problem that has not yet been addressed by the security or formal methods …