Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

02/01/2021
by   Ana Cristina Franco da Silva, et al.
0

A Digital Twin (DT) is a digital representation of a physical object used to simulate it before it is built or to predict failures after the object is deployed. The DT concept was originally applied to manufacturing but has been gaining attention in other areas. In this article, we introduce a novel concept called Cyber Digital Twin (CDT), which transfers the idea of the DT to automotive software for the purpose of security analysis. In our approach, the ECU software (i.e., firmware) is transformed into a CDT, which contains automatically extracted, security-relevant information from the firmware. With this, we can evaluate automotive security requirements through automated security requirements verification using policy enforcement checks and detection of security vulnerabilities. The evaluation can be done continuously using newly integrated checks and published security vulnerabilities.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 8

02/04/2021

Challenges in Digital Twin Development for Cyber-Physical Production Systems

The recent advancement of information and communication technology makes...
10/30/2020

Evaluation of vulnerability reproducibility in container-based Cyber Range

A cyber range, a practical and highly educational information security e...
09/09/2019

Análise de Segurança Baseada em Roles para Fábricas de Software

Most software factories contain applications with sensitive information ...
07/14/2020

multiple layers of fuzzy logic to quantify vulnerabilies in iot

Quantifying vulnerabilities of network systems has been a highly controv...
09/06/2019

Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications

Due to the ability to overcome the geospatial limitations and to the pos...
06/05/2019

Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity

This paper analyzes a recent debate on regulating cyber weapons through ...
06/18/2021

Risk-Oriented Design Approach For Forensic-Ready Software Systems

Digital forensic investigation is a complex and time-consuming activity ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.