Identification and verification of attack-tree threat models in connected vehicles

M Ebrahimi, C Striessnig, JC Triginer… - arXiv preprint arXiv …, 2022 - arxiv.org
As a result of the ever-increasing application of cyber-physical components in the
automotive industry, cybersecurity has become an urgent topic. Adapting technologies and …

THREATGET: towards automated attack tree analysis for automotive cybersecurity

S Chlup, K Christl, C Schmittner, AM Shaaban… - Information, 2022 - mdpi.com
The automotive domain is moving away from simple isolated vehicles to interconnected
networks of heterogeneous systems forming a complex transportation infrastructure. The …

Identifying Cybersecurity Focus Areas in Connected Cars Based on WP. 29 UN-R155 Attack Vectors and Beyond

N Huq, R Vosseler - 2022 - sae.org
No. 155, the “Uniform provisions concerning the approval of vehicles with regards to cyber
security and cyber security management systems,” which became a binding resolution on …

Model-based attack tree generation for cybersecurity risk-assessments in automotive

M Kern, B Liu, VP Betancourt… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Networked and highly automated driver assistance systems require interfaces to the outside
world and within the vehicle. These can potentially be used for cybersecurity attacks …

Threat modeling and attack simulations of connected vehicles: Proof of concept

W Xiong, F Krantz, R Lagerström - … Czech Republic, February 23-25, 2019 …, 2020 - Springer
A modern vehicle contains over a hundred Electronic Control Units (ECUs) that
communicate over in-vehicle networks, and can also be connected to external networks …

[HTML][HTML] A simulation framework for automotive cybersecurity risk assessment

DND Jayaratne, SH Kamtam, SA Shaikh… - … Modelling Practice and …, 2024 - Elsevier
Human-initiated disruptions such as cyberattacks on connected vehicles have the potential
to cause cascading failures in transport systems, leading to systemic risks.'ISO/SAE 21434 …

Revisiting Automotive Attack Surfaces: a Practitioners' Perspective

P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang… - 2024 IEEE Symposium …, 2023 - computer.org
As modern vehicles become increasingly complex in terms of both external attack surfaces
and internal in-vehicle network (IVN) topology, ensuring their cybersecurity remains a …

Automation in automotive security by using attacker privileges

J Dürrwang, F Sommer, R Kriesten - 2021 - hss-opus.ub.ruhr-unibochum.de
Modern vehicles contain a large number of electronic information technology components
which are increasingly connected to the outside world. This results in a higher risk for …

Resilient shield: Reinforcing the resilience of vehicles against security threats

K Strandberg, T Rosenstatter, R Jolak… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
Vehicles have become complex computer systems with multiple communication interfaces.
In the future, vehicles will have even more connections to eg, infrastructure, pedestrian …

Sara: Security automotive risk analysis method

JP Monteuuis, A Boudguiga, J Zhang… - Proceedings of the 4th …, 2018 - dl.acm.org
Connected and automated vehicles aim to improve the comfort and the safety of the driver
and passengers. To this end, car manufacturers continually improve actual standardized …