Skip to main content

Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13285))

Included in the following conference series:

Abstract

Safety-critical Cyber-Physical Systems, such as high-tech cars, require new risk management approaches to investigate and address their cybersecurity risks. The current standard for automotive security ISO/SAE 21434 presents such a framework, which discusses the threats, the associated risk, and the chosen treatment, which can be risk reduction through the implementation of a countermeasure or defense. This paper presents a residual cybersecurity risk management framework aligned with the ISO/SAE 21434 framework. The proposed approach audits the applied defenses over the generated attack paths for the identified threats and associated system components. Flow networks are used to calculate the reduced or mitigated risk and the remaining risk of the threat in the presence of the selected countermeasure. The feasibility of the method is explained using a simple automotive system example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dibaei, M., et al: An overview of attacks and defences on intelligent connected vehicles (2019). arXiv preprint arXiv:1907.07455

  2. Sommer, F., Dürrwang, J., Kriesten, R.: Survey and classification of automotive security attacks. Information 10(4), 148 (2019)

    Article  Google Scholar 

  3. Blank, R.M.: Guide for conducting risk assessments (2011)

    Google Scholar 

  4. Shostack, A.: Threat Modeling: Designing for Security. John Wiley & Sons, Hoboken (2014)

    Google Scholar 

  5. https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/

  6. https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese-hack-remote-control-brakes

  7. Liedtke, T.: Risk assessment according to the ISO/SAE 21434: 2021 (2021)

    Google Scholar 

  8. https://www.helpnetsecurity.com/2018/05/23/hack-bmw-cars/

  9. Birch, J., et al.: Safety cases and their role in ISO 26262 functional safety assessment. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 154–165. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40793-2_15

    Chapter  Google Scholar 

  10. Anisetti, M., Ardagna, C.A., Bena, N., Foppiani, A.: An assurance-based risk management framework for distributed systems. In: 2021 IEEE International Conference on Web Services (ICWS), pp. 482–492. IEEE (2021)

    Google Scholar 

  11. Risk management - Guidelines, International Organization for Stan-dardization, Geneva, CH, Standard (2018)

    Google Scholar 

  12. Joint Task Force Transformation Initiative, Guide for Conducting Risk Assessments, National Institute of Standards and Technology, Gaithersburg, MD, Technical Report NIST Special Publication (SP) 800–30, Rev. 1 (2012)

    Google Scholar 

  13. Nurse, J.R., Creese, S.,De Roure, D.: Security risk assessment in Internet of Things systems. IT Prof. 19(5), 20–26 (2017)

    Google Scholar 

  14. Methods for Testing & Specification; Risk-based Security Assessment and Testing Methodologies, European Telecommunications Standards Institute, Sophia Antipolis Cedex, France, Standard (2016)

    Google Scholar 

  15. ISO/IEC, ISO/SAE DIS 21434 - Road Vehicles - Cybersecurity Engineering, International Organization for Standardization, Geneva, CH (2020)

    Google Scholar 

  16. SAE International, Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, Technical Report J3061, SAE International (2016)

    Google Scholar 

  17. ISO - International Organization for Standardization. ISO 26262 Road vehicles. Functional Safety Part 1–10 (2011)

    Google Scholar 

  18. ISO/IEC, ISO/IEC 18045:2008(E): Information technology - Security techniques-Methodology for IT security evaluation, International Organization for Standardization, Geneva, CH (2008)

    Google Scholar 

  19. The EVITA consortium, EVITA Threat and risk analysis (2009). https://www.evita-project.org

  20. McCarthy, C., Harnett, K., Carter, A.: Characterization of Potential Security Threatsin Modern Automobiles: A Composite Modeling Approach, National HighwayTraffic Safety Administration (2014)

    Google Scholar 

  21. Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)

    Google Scholar 

  22. Schmittner, C., Ma, Z., Smith, P.: FMVEA for safety and security analysis of intelligent and cooperative vehicles. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 282–288. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10557-4_31

    Chapter  Google Scholar 

  23. Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA a security-aware hazard and risk analysis method. In: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 621–624. IEEE (2015)

    Google Scholar 

  24. McCarthy, C., Harnett, K., Carter, A.: Characterization of potential security threats in modern automobiles: A composite modeling approach. No. DOT HS 812 074. United States. National Highway Traffic Safety Administration (2014)

    Google Scholar 

  25. Kure, H.I., Islam, S., Razzaque, M.A.: An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci. 8(6), 898 (2018)

    Article  Google Scholar 

  26. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)

    Google Scholar 

  27. Wang, Y., Wang, Y., Qin, H., Ji, H., Zhang, Y., Wang, J.: A systematic risk assessment framework of automotive cybersecurity. Automot. Innov. 4(3), 253–261 (2021). https://doi.org/10.1007/s42154-021-00140-6

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, A., Bryans, J., Sabaliauskaite, G. (2022). Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2022. Lecture Notes in Computer Science, vol 13285. Springer, Cham. https://doi.org/10.1007/978-3-031-16815-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16815-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16814-7

  • Online ISBN: 978-3-031-16815-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics