Combining Cyber Security Intelligence to Refine Automotive Cyber Threats

被引:1
|
作者
Sommer, Florian [1 ]
Gierl, Mona [1 ]
Kriesten, Reiner [1 ]
Kargl, Frank [2 ]
Sax, Eric [3 ]
机构
[1] Karlsruhe Univ Appl Sci, Moltkestr 30, D-76133 Karlsruhe, Baden Wurttembe, Germany
[2] Ulm Univ, Helmholtzstr 16, D-89081 Ulm, Baden Wurttembe, Germany
[3] Karlsruhe Inst Technol, Kaiserstr 12, D-76131 Karlsruhe, Baden Wurttembe, Germany
关键词
Automotive security; taxonomies; attacks; vulnerabilities; mitigations;
D O I
10.1145/3644075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this article, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumeration and Classification (CAPEC), and Common Weakness Enumeration (CWE). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.
引用
收藏
页数:34
相关论文
共 50 条
  • [41] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [42] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246
  • [43] A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector
    Kumar, Venkatachary Sampath
    Prasad, Jagdish
    Samikannu, Ravi
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2018, 14 (02) : 101 - 119
  • [44] Cyber Security Threats Detection Using Ensemble Architecture
    Chou, Te-Shun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (02): : 17 - 31
  • [45] A Survey on Cyber Security Threats and Challenges in Modern Society
    Sajal, Sayeed Z.
    Jahan, Israt
    Nygard, Kendall E.
    2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2019, : 525 - 528
  • [46] NEW THREATS TO THE NATIONAL SECURITY OF STATES - CYBER THREAT
    Stefanescu, Daniel-Cornel
    Papoi, Alina
    SCIENTIFIC JOURNAL OF SILESIAN UNIVERSITY OF TECHNOLOGY-SERIES TRANSPORT, 2020, 107 : 177 - 182
  • [47] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [48] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Mamoona Humayun
    Mahmood Niazi
    NZ Jhanjhi
    Mohammad Alshayeb
    Sajjad Mahmood
    Arabian Journal for Science and Engineering, 2020, 45 : 3171 - 3189
  • [49] Cyber-Physical Systems: Security Threats and Countermeasures
    Hammoudeh, Mohammad
    Epiphaniou, Gregory
    Pinto, Pedro
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [50] Maritime Cyber Security Analysis - How to Reduce Threats?
    Mrakovic, Ivan
    Vojinovic, Ranko
    TRANSACTIONS ON MARITIME SCIENCE-TOMS, 2019, 8 (01): : 132 - 139