Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Through international regulations (most prominently the latest UNECE regulation) and standards, the already widely perceived higher need for cybersecurity in automotive systems has been recognized and will mandate higher efforts for cybersecurity engineering. T he UNECE also demands the effectiveness of these engineering to be verified and validated through testing. T his requires both a significantly higher rate and more comprehensiveness of cybersecurity testing that is not effectively to cope with using current, predominantly manual, automotive cybersecurity testing techniques. To allow for comprehensive and efficient testing at all stages of the automotive life cycle, including supply chain parts not at band, and to facilitate efficient third party testing, as well as to test under real-world conditions, also methodologies for testing the cybersecurity of vehicular systems as a black box are necessary. T his paper therefore presents a model and attack tree-based approach to (semi-)automate automotive cybersecurity testing, as well as considerations for automatically black box-deriving models for the use in attack modeling.

          Related collections

          Author and article information

          Journal
          13 July 2021
          Article
          2107.06024
          acd4eabe-726f-4ac4-a162-c1d3b64669ca

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          7 pages, 6 figures, accepted for the joint SRCNAS/STRIVE workshop at the 6th IEEE European Symposium on Security and Privacy
          cs.CR

          Security & Cryptology
          Security & Cryptology

          Comments

          Comment on this article