Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling
{"title":"攻击图在汽车领域威胁分析和风险评估中的应用","authors":"Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling","doi":"10.1109/CogMob55547.2022.10118297","DOIUrl":null,"url":null,"abstract":"Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.","PeriodicalId":430975,"journal":{"name":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain\",\"authors\":\"Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling\",\"doi\":\"10.1109/CogMob55547.2022.10118297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.\",\"PeriodicalId\":430975,\"journal\":{\"name\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CogMob55547.2022.10118297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CogMob55547.2022.10118297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain
Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.