THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity

The automotive domain is moving away from simple isolated vehicles to interconnected networks of heterogeneous systems forming a complex transportation infrastructure. The additional means of communication result in increased attack surfaces which can be exploited by physical as well as remote attac...

Full description

Bibliographic Details
Main Authors: Sebastian Chlup, Korbinian Christl, Christoph Schmittner, Abdelkader Magdy Shaaban, Stefan Schauer, Martin Latzenhofer
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/14/1/14
_version_ 1797440937067020288
author Sebastian Chlup
Korbinian Christl
Christoph Schmittner
Abdelkader Magdy Shaaban
Stefan Schauer
Martin Latzenhofer
author_facet Sebastian Chlup
Korbinian Christl
Christoph Schmittner
Abdelkader Magdy Shaaban
Stefan Schauer
Martin Latzenhofer
author_sort Sebastian Chlup
collection DOAJ
description The automotive domain is moving away from simple isolated vehicles to interconnected networks of heterogeneous systems forming a complex transportation infrastructure. The additional means of communication result in increased attack surfaces which can be exploited by physical as well as remote attackers if not secured thoroughly. Thus, the automotive sector is exposed to new cyber risk factors. Consequently, joint approaches targeting securing vehicles and infrastructure by identifying and mitigating potential threats for the automotive domain have been developed in several research projects. This paper builds on developments originating from these projects and correlated standards and regulations. Moreover, the extension of an existing threat modeling tool—THREATGET—with a novel automated approach toward attack propagation will be introduced. Therefore, we will conduct an analysis of a real-world example from the automotive domain. Furthermore, we will identify and analyze potential threats and discuss their accumulation to automatically generate an attack tree.
first_indexed 2024-03-09T12:16:37Z
format Article
id doaj.art-3bc59fd3e1aa4cd89d82ca8daa377014
institution Directory Open Access Journal
issn 2078-2489
language English
last_indexed 2024-03-09T12:16:37Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Information
spelling doaj.art-3bc59fd3e1aa4cd89d82ca8daa3770142023-11-30T22:46:04ZengMDPI AGInformation2078-24892022-12-011411410.3390/info14010014THREATGET: Towards Automated Attack Tree Analysis for Automotive CybersecuritySebastian Chlup0Korbinian Christl1Christoph Schmittner2Abdelkader Magdy Shaaban3Stefan Schauer4Martin Latzenhofer5Austrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaAustrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaAustrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaAustrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaAustrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaAustrian Institute of Technology GmbH, Giefinggasse 4, 1210 Vienna, AustriaThe automotive domain is moving away from simple isolated vehicles to interconnected networks of heterogeneous systems forming a complex transportation infrastructure. The additional means of communication result in increased attack surfaces which can be exploited by physical as well as remote attackers if not secured thoroughly. Thus, the automotive sector is exposed to new cyber risk factors. Consequently, joint approaches targeting securing vehicles and infrastructure by identifying and mitigating potential threats for the automotive domain have been developed in several research projects. This paper builds on developments originating from these projects and correlated standards and regulations. Moreover, the extension of an existing threat modeling tool—THREATGET—with a novel automated approach toward attack propagation will be introduced. Therefore, we will conduct an analysis of a real-world example from the automotive domain. Furthermore, we will identify and analyze potential threats and discuss their accumulation to automatically generate an attack tree.https://www.mdpi.com/2078-2489/14/1/14automotive cybersecuritythreat modelingattack treesrisk management
spellingShingle Sebastian Chlup
Korbinian Christl
Christoph Schmittner
Abdelkader Magdy Shaaban
Stefan Schauer
Martin Latzenhofer
THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
Information
automotive cybersecurity
threat modeling
attack trees
risk management
title THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
title_full THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
title_fullStr THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
title_full_unstemmed THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
title_short THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
title_sort threatget towards automated attack tree analysis for automotive cybersecurity
topic automotive cybersecurity
threat modeling
attack trees
risk management
url https://www.mdpi.com/2078-2489/14/1/14
work_keys_str_mv AT sebastianchlup threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity
AT korbinianchristl threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity
AT christophschmittner threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity
AT abdelkadermagdyshaaban threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity
AT stefanschauer threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity
AT martinlatzenhofer threatgettowardsautomatedattacktreeanalysisforautomotivecybersecurity