People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Bryans, Jeremy William
Coventry University
in Cooperation with on an Cooperation-Score of 37%
Topics
- control device
- abstract
- vehicle
- tree
- implementation
- architecture
- library
- security
- assessment
- modeling
- intelligence
- connected vehicle
- time window
- test bed
- internet
- case study
- computer science
- manual
- design
- specification
- automation
- defense
- design method
- submarine
- flight recorder
- iterative method
- software
- vehicle operation
- radio equipment
- military vehicle
- show 0 more
Publications (15/15 displayed)
- 2021Using internal context to detect automotive controller area network attackscitations
- 2020A Template-Based Method for the Generation of Attack Treescitations
- 2019A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Examplecitations
- 2019Enabling security checking of automotive ECUs with formal CSP modelscitations
- 2019An Evaluation Ontology Applied to Connected Vehicle Security Assurancecitations
- 2018Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windowscitations
- 2018Building an automotive security assurance case using systematic security evaluationscitations
- 2018Formalising Systematic Security Evaluations using Attack Trees for Automotive Applicationscitations
- 2018Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network
- 2017Towards A Testbed for Automotive Cybersecuritycitations
- 2017Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applicationscitations
- 2017The Internet of Automotive Thingscitations
- 2017Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applicationscitations
- 2016Combining Third Party Components Securely in Automotive Systemscitations
- 2016The identification and demonstration of plausible cyber threats against military vehicle operations from software defined radio
Places of action
conferencepaper
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications
Abstract
Part 4: Defences and Evaluation ; International audience ; Vehicles are insecure. To protect such systems, we must begin by identifying any weaknesses. One approach is to apply a systematic security evaluation to the system under test. In this paper we present a method for systematically generating tests based on attack trees. We formalise the attack trees as provably-equivalent process-algebraic processes, then automatically generate tests from the process-algebraic representation. Attack trees may include manual input (and thus so will some test cases) but scriptable test cases are automatically executed. Our approach is inspired by model based testing, but allows for the fact that we do not have a specification of the system under test. We demonstrate this methodology on a case study and find that this is a viable method for automation of systematic security evaluations.
Topics
Search in FID move catalog