Combining Cyber Security Intelligence to Refine Automotive Cyber Threats

被引:1
|
作者
Sommer, Florian [1 ]
Gierl, Mona [1 ]
Kriesten, Reiner [1 ]
Kargl, Frank [2 ]
Sax, Eric [3 ]
机构
[1] Karlsruhe Univ Appl Sci, Moltkestr 30, D-76133 Karlsruhe, Baden Wurttembe, Germany
[2] Ulm Univ, Helmholtzstr 16, D-89081 Ulm, Baden Wurttembe, Germany
[3] Karlsruhe Inst Technol, Kaiserstr 12, D-76131 Karlsruhe, Baden Wurttembe, Germany
关键词
Automotive security; taxonomies; attacks; vulnerabilities; mitigations;
D O I
10.1145/3644075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this article, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumeration and Classification (CAPEC), and Common Weakness Enumeration (CWE). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] Computational intelligence in cyber security
    Dasgupta, Dipankar
    2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, : 2 - 3
  • [22] Predicting Cyber Threats with Virtual Security Products
    Chen, Shang-Tse
    Han, Yufei
    Chau, Duen Horng
    Gates, Christopher
    Hart, Michael
    Roundy, Kevin A.
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 189 - 199
  • [23] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [24] Cyber security information exchange to gain insight into the effects of cyber threats and incidents
    Fransen, F.
    Smulders, A.
    Kerkdijk, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 106 - 112
  • [25] The Cyber Security Gap in Latin America Against the Global Context of Cyber Threats
    Aguilar Antonio, Juan Manuel
    REVISTA DE ESTUDIOS EN SEGURIDAD INTERNACIONAL-RESI, 2020, 6 (02): : 17 - 43
  • [26] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [27] Evaluation of Cyber Security Threats in Banking Systems
    Stanikzai, Abdul Qarib
    Shah, Munam Ali
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [28] Cyber Security: Terms, Laws, Threats and Protection
    Jha, Manasi
    Anand, C. S.
    Mahawar, Yogesh
    Kalyan, Uday
    Verma, Vikas
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 148 - 151
  • [29] Middle East Cyber Security: Threats and Opportunities
    Shires, James
    Handler, Simon
    Moran, Jim
    Bahgat, Gawdat
    MIDDLE EAST POLICY, 2021, 28 (3-4) : 22 - 39
  • [30] Cyber Security Threats - Smart Grid Infrastructure
    Pandey, Rajendra Kumar
    Misra, Mohit
    2016 NATIONAL POWER SYSTEMS CONFERENCE (NPSC), 2016,