Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A modern vehicle contains over a hundred Electronic Control Units (ECUs) that communicate over in-vehicle networks, and can also be connected to external networks making them vulnerable to cyber attacks. To improve the security of connected vehicles, threat modeling can be applied to proactively find potential security issues and help manufacturers to design more secure vehicles. It can also be combined with probabilistic attack simulations to provide quantitative security measurements, which has not been commonly used while shown efficient in other domains. This paper reviews research in the field, showing that not much work has been done in the combined area of connected vehicles and threat modeling with attack simulations. We have implemented and conducted attack simulations on two vehicle threat models using a tool called securiCAD. Our work serves as a proof of concept of the approach and indicates that the approach is useful. Especially if more research of vehicle-specific vulnerabilities, weaknesses, and countermeasures is done in order to provide more accurate analyses, and to include this in a more tailored vehicle metamodel.

Cite

CITATION STYLE

APA

Xiong, W., Krantz, F., & Lagerström, R. (2020). Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept. In Communications in Computer and Information Science (Vol. 1221 CCIS, pp. 272–287). Springer. https://doi.org/10.1007/978-3-030-49443-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free