Kern et al., 2021 - Google Patents
Model-based attack tree generation for cybersecurity risk-assessments in automotiveKern et al., 2021
- Document ID
- 4524756520823505932
- Author
- Kern M
- Liu B
- Betancourt V
- Becker J
- Publication year
- Publication venue
- 2021 IEEE International Symposium on Systems Engineering (ISSE)
External Links
Snippet
Networked and highly automated driver assistance systems require interfaces to the outside world and within the vehicle. These can potentially be used for cybersecurity attacks. Therefore, cybersecurity risk analyses are essential to adequately counter cybersecurity …
- 238000004450 types of analysis 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kern et al. | Model-based attack tree generation for cybersecurity risk-assessments in automotive | |
| Schmittner et al. | A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems | |
| Cuenot et al. | 11 the east-adl architecture description language for automotive embedded software | |
| Apvrille et al. | SysML-Sec: A SysML environment for the design and development of secure embedded systems | |
| Geismann et al. | Towards ensuring security by design in cyber-physical systems engineering processes | |
| Macher et al. | Integrated safety and security development in the automotive domain | |
| Guissouma et al. | Lifecycle management of automotive safety-critical over the air updates: A systems approach | |
| Amorim et al. | Systematic pattern approach for safety and security co-engineering in the automotive domain | |
| Dobaj et al. | Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study. | |
| Ponsard et al. | Goal-oriented co-engineering of security and safety requirements in cyber-physical systems | |
| Schmittner et al. | Asset driven ISO/SAE 21434 compliant automotive cybersecurity analysis with threatget | |
| Macher et al. | An integrated view on automotive SPICE, functional safety and cyber-security | |
| Macher et al. | Dependable integration concepts for human-centric AI-based systems | |
| Roudier et al. | Towards the model-driven engineering of security requirements for embedded systems | |
| Moukahal et al. | Vehicle software engineering (VSE): Research and practice | |
| Kawanishi et al. | Detailed analysis of security evaluation of automotive systems based on JASO TP15002 | |
| Macher et al. | Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition. | |
| Bucher et al. | Automated assessment of E/E-architecture variants using an integrated model-and simulation-based approach | |
| Wolf | Combining safety and security threat modeling to improve automotive penetration testing | |
| Bucher et al. | An integrated approach enabling cross-domain simulation of model-based E/E-architectures | |
| Apvrille et al. | SysML-Sec: A model-driven environment for developing secure embedded systems | |
| Giusto et al. | Modeling and analysis of automotive systems: Current approaches and future trends | |
| Sowka et al. | Requirements for the automated generation of attack trees to support automotive cybersecurity assurance | |
| Hillenbrand et al. | Development of electric/electronic architectures for safety‐related vehicle functions | |
| Sommer | Automatic attack path generation in automotive model-based security testing |