Skip to main content

2019 | OriginalPaper | Buchkapitel

SAM: A Security Abstraction Model for Automotive Software Systems

verfasst von : Markus Zoppelt, Ramin Tavakoli Kolagari

Erschienen in: Security and Safety Interplay of Intelligent Software Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the emergence of (semi-)autonomous vehicles and networked technologies in the automotive domain, the development of secure and reliable vehicles plays an increasingly important role in the protection of road users. Safe and secure road transport is a major societal and political objective, which is substantiated by the concrete goal of the European Commission to “move close to zero fatalities in road transport” (White Paper of the European Commission Roadmap to a Single European Transport Area—Towards a competitive and resource efficient transport system, 2011, page 10.) within the next three decades. One historically often neglected aspect of this objective in automotive system development is security, i.e., freedom from maliciously implemented threats. In the automotive software industry, model-based engineering is the current state of the practice. Instead of integrating security into the entire system development process, it currently tends to be an afterthought. Because of the tight interdependencies and integration of components, the consequences of gaping security flaws are grave. The contribution of this paper is a secure modeling approach enabling the automotive engineer to analyze the software system in the context of industrial model-based engineering in an early phase. The security modeling language specification is presented as a proposed annex to the relevant industry standard EAST-ADL, and therefore offers a common modeling approach for architectural and security aspects. All security extensions are in line with this standard and its meta level, which is shared with AUTOSAR. The security modeling language specification is demonstrated in a small modeling example, along with a formal evaluation which applies the Grounded Theory method to a set of expert interviews, showing that it is comprehensive and embraces even non-standardized pertinent research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Bißmeyer, N., et al.: PREparing SEcuRe VEhicle-to-X Communication Systems - Deliverable 1.3 - V2X Security Architecture v2 (2014) Bißmeyer, N., et al.: PREparing SEcuRe VEhicle-to-X Communication Systems - Deliverable 1.3 - V2X Security Architecture v2 (2014)
5.
Zurück zum Zitat Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef
7.
Zurück zum Zitat Glaser, B.G., Strauss, A.L., Strutzel, E.: The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 17(4), 364 (1968)CrossRef Glaser, B.G., Strauss, A.L., Strutzel, E.: The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 17(4), 364 (1968)CrossRef
9.
Zurück zum Zitat Haskins, C., Forsberg, K., Krueger, M., Walden, D., Hamelin, D.: Systems engineering handbook. In: INCOSE (2006) Haskins, C., Forsberg, K., Krueger, M., Walden, D., Hamelin, D.: Systems engineering handbook. In: INCOSE (2006)
10.
Zurück zum Zitat Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: 2009 9th International Conference on Intelligent Transport Systems Telecommunications, ITST 2009, pp. 641–646. IEEE (2009). https://doi.org/10.1109/ITST.2009.5399279 Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: 2009 9th International Conference on Intelligent Transport Systems Telecommunications, ITST 2009, pp. 641–646. IEEE (2009). https://​doi.​org/​10.​1109/​ITST.​2009.​5399279
11.
Zurück zum Zitat Holm, H., Ekstedt, M., Sommestad, T., Korman, M.: A Manual for the Cyber Security Modeling Language (2014) Holm, H., Ekstedt, M., Sommestad, T., Korman, M.: A Manual for the Cyber Security Modeling Language (2014)
12.
Zurück zum Zitat International Organization for Standardization: Road vehicles - functional safety - Part 2: Management of functional safety. International Organization for Standardization 066(20), 26 (2009) International Organization for Standardization: Road vehicles - functional safety - Part 2: Management of functional safety. International Organization for Standardization 066(20), 26 (2009)
13.
Zurück zum Zitat ISO/IEC: ISO/IEC 15408–1:2009 - Evaluation Criteria for IT Security 2009, 64 (2009) ISO/IEC: ISO/IEC 15408–1:2009 - Evaluation Criteria for IT Security 2009, 64 (2009)
14.
Zurück zum Zitat Johansson, C., Bucanac, C.: The V-Model. IDE, University Of Karlskrona, Ronneby (1999) Johansson, C., Bucanac, C.: The V-Model. IDE, University Of Karlskrona, Ronneby (1999)
16.
Zurück zum Zitat Lee, J., Bagheri, B., Kao, H.A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf. Lett. 3, 18–23 (2015)CrossRef Lee, J., Bagheri, B., Kao, H.A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf. Lett. 3, 18–23 (2015)CrossRef
19.
Zurück zum Zitat Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. In: Published by FIRST-Forum of Incident Response and Security Teams, vol. 1, p. 23 (2007) Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. In: Published by FIRST-Forum of Incident Response and Security Teams, vol. 1, p. 23 (2007)
20.
Zurück zum Zitat Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Defcon 22, 1–90 (2014) Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Defcon 22, 1–90 (2014)
24.
Zurück zum Zitat Rao, K.R.M., Pant, D.: A threat risk modeling framework for Geospatial Weather Information System (GWIS): a DREAD based study. Int. J. Adv. Comput. Sci. Appl. 1(3) (2010) Rao, K.R.M., Pant, D.: A threat risk modeling framework for Geospatial Weather Information System (GWIS): a DREAD based study. Int. J. Adv. Comput. Sci. Appl. 1(3) (2010)
26.
Zurück zum Zitat Sandelin, A., Alkema, W., Engström, P., Wasserman, W.W., Lenhard, B.: JASPAR: an open-access database for eukaryotic transcription factor binding profiles. Nucleic Acids Res. 32(Suppl. 1), D91–D94 (2004)CrossRef Sandelin, A., Alkema, W., Engström, P., Wasserman, W.W., Lenhard, B.: JASPAR: an open-access database for eukaryotic transcription factor binding profiles. Nucleic Acids Res. 32(Suppl. 1), D91–D94 (2004)CrossRef
27.
Zurück zum Zitat Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
28.
Zurück zum Zitat Smith, C., Francisco, S.: The Car Hacker’s Handbook a Guide for the Penetration Tester About the Contributing Author About the Technical Reviewer (2016) Smith, C., Francisco, S.: The Car Hacker’s Handbook a Guide for the Penetration Tester About the Contributing Author About the Technical Reviewer (2016)
29.
31.
Zurück zum Zitat Valasek, C., Miller, C.: Adventures in automotive networks and control units. Technical White Paper, vol. 21, p. 99 (2013) Valasek, C., Miller, C.: Adventures in automotive networks and control units. Technical White Paper, vol. 21, p. 99 (2013)
32.
Zurück zum Zitat Van Tilborg, H.C.A., Jajodia, S.: Encyclopedia of Cryptography and Security. Springer, New York (2014)MATH Van Tilborg, H.C.A., Jajodia, S.: Encyclopedia of Cryptography and Security. Springer, New York (2014)MATH
Metadaten
Titel
SAM: A Security Abstraction Model for Automotive Software Systems
verfasst von
Markus Zoppelt
Ramin Tavakoli Kolagari
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-16874-2_5

Premium Partner