Abstract
Safety-critical Cyber-Physical Systems, such as high-tech cars, require new risk management approaches to investigate and address their cybersecurity risks. The current standard for automotive security ISO/SAE 21434 presents such a framework, which discusses the threats, the associated risk, and the chosen treatment, which can be risk reduction through the implementation of a countermeasure or defense. This paper presents a residual cybersecurity risk management framework aligned with the ISO/SAE 21434 framework. The proposed approach audits the applied defenses over the generated attack paths for the identified threats and associated system components. Flow networks are used to calculate the reduced or mitigated risk and the remaining risk of the threat in the presence of the selected countermeasure. The feasibility of the method is explained using a simple automotive system example.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dibaei, M., et al: An overview of attacks and defences on intelligent connected vehicles (2019). arXiv preprint arXiv:1907.07455
Sommer, F., Dürrwang, J., Kriesten, R.: Survey and classification of automotive security attacks. Information 10(4), 148 (2019)
Blank, R.M.: Guide for conducting risk assessments (2011)
Shostack, A.: Threat Modeling: Designing for Security. John Wiley & Sons, Hoboken (2014)
https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/
https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese-hack-remote-control-brakes
Liedtke, T.: Risk assessment according to the ISO/SAE 21434: 2021 (2021)
Birch, J., et al.: Safety cases and their role in ISO 26262 functional safety assessment. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 154–165. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40793-2_15
Anisetti, M., Ardagna, C.A., Bena, N., Foppiani, A.: An assurance-based risk management framework for distributed systems. In: 2021 IEEE International Conference on Web Services (ICWS), pp. 482–492. IEEE (2021)
Risk management - Guidelines, International Organization for Stan-dardization, Geneva, CH, Standard (2018)
Joint Task Force Transformation Initiative, Guide for Conducting Risk Assessments, National Institute of Standards and Technology, Gaithersburg, MD, Technical Report NIST Special Publication (SP) 800–30, Rev. 1 (2012)
Nurse, J.R., Creese, S.,De Roure, D.: Security risk assessment in Internet of Things systems. IT Prof. 19(5), 20–26 (2017)
Methods for Testing & Specification; Risk-based Security Assessment and Testing Methodologies, European Telecommunications Standards Institute, Sophia Antipolis Cedex, France, Standard (2016)
ISO/IEC, ISO/SAE DIS 21434 - Road Vehicles - Cybersecurity Engineering, International Organization for Standardization, Geneva, CH (2020)
SAE International, Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, Technical Report J3061, SAE International (2016)
ISO - International Organization for Standardization. ISO 26262 Road vehicles. Functional Safety Part 1–10 (2011)
ISO/IEC, ISO/IEC 18045:2008(E): Information technology - Security techniques-Methodology for IT security evaluation, International Organization for Standardization, Geneva, CH (2008)
The EVITA consortium, EVITA Threat and risk analysis (2009). https://www.evita-project.org
McCarthy, C., Harnett, K., Carter, A.: Characterization of Potential Security Threatsin Modern Automobiles: A Composite Modeling Approach, National HighwayTraffic Safety Administration (2014)
Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
Schmittner, C., Ma, Z., Smith, P.: FMVEA for safety and security analysis of intelligent and cooperative vehicles. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 282–288. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10557-4_31
Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA a security-aware hazard and risk analysis method. In: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 621–624. IEEE (2015)
McCarthy, C., Harnett, K., Carter, A.: Characterization of potential security threats in modern automobiles: A composite modeling approach. No. DOT HS 812 074. United States. National Highway Traffic Safety Administration (2014)
Kure, H.I., Islam, S., Razzaque, M.A.: An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci. 8(6), 898 (2018)
Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)
Wang, Y., Wang, Y., Qin, H., Ji, H., Zhang, Y., Wang, J.: A systematic risk assessment framework of automotive cybersecurity. Automot. Innov. 4(3), 253–261 (2021). https://doi.org/10.1007/s42154-021-00140-6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Khan, A., Bryans, J., Sabaliauskaite, G. (2022). Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2022. Lecture Notes in Computer Science, vol 13285. Springer, Cham. https://doi.org/10.1007/978-3-031-16815-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-16815-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16814-7
Online ISBN: 978-3-031-16815-4
eBook Packages: Computer ScienceComputer Science (R0)