7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Survey and Classification of Automotive Security Attacks

      , ,
      Information
      MDPI AG

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projects in which vehicles were attacked in order to trigger various functions. In some cases these functions were critical to operational safety. To make automotive systems more secure, concepts must be developed that take existing attacks into account. Several taxonomies were proposed to analyze and classify security attacks. However, in this paper we show that the existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development phases such as threat analysis or security testing. In order to be able to use the information that security attacks can provide for the development of security concepts and for testing automotive systems, we propose a comprehensive taxonomy with degrees of detail which addresses these tasks. In particular, our proposed taxonomy is designed in such a wa, that each step in the vehicle development process can leverage it.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Article: not found

          A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A taxonomy of computer program security flaws

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Software penetration testing

                Bookmark

                Author and article information

                Journal
                INFOGG
                Information
                Information
                MDPI AG
                2078-2489
                April 2019
                April 19 2019
                : 10
                : 4
                : 148
                Article
                10.3390/info10040148
                673164c6-8e4c-4064-9c26-1aa887740efa
                © 2019

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article