A Systematic Approach to Automotive Security

03/06/2023
by   Masoud Ebrahimi, et al.
0

We propose a holistic methodology for designing automotivesystems that consider security a central concern at every design stage.During the concept design, we model the system architecture and definethe security attributes of its components. We perform threat analysis onthe system model to identify structural security issues. From that analysis,we derive attack trees that define recipes describing steps to successfullyattack the system's assets and propose threat prevention measures.The attack tree allows us to derive a verification and validation (V V)plan, which prioritizes the testing effort. In particular, we advocate usinglearning for testing approaches for the black-box components. It consistsof inferring a finite state model of the black-box component from its executiontraces. This model can then be used to generate new relevanttests, model check it against requirements, and compare two differentimplementations of the same protocol. We illustrate the methodologywith an automotive infotainment system example. Using the advocated approach, we could also document unexpected and potentially criticalbehavior in our example systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/23/2018

Black-box Adversarial Attacks with Limited Queries and Information

Current neural network-based classifiers are susceptible to adversarial ...
research
07/21/2020

Towards Visual Distortion in Black-Box Attacks

Constructing adversarial examples in a black-box threat model injures th...
research
12/06/2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

As smart bands make life more convenient and provide a positive lifestyl...
research
07/15/2021

Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing

Cybersecurity testing of automotive systems has become a practical neces...
research
07/13/2021

A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation

Through international regulations (most prominently the latest UNECE reg...
research
10/19/2021

Holistic Hardware Security Assessment Framework: A Microarchitectural Perspective

Our goal is to enable holistic hardware security evaluation from the mic...
research
10/25/2020

Security Assessment of Interposer-based Chiplet Integration

With transistor scaling reaching its limits, interposer-based integratio...

Please sign up or login with your details

Forgot password? Click here to reset