Abstract
Physical persons playing the role of car drivers consume data that is sourced from the Internet and, at the same time, themselves act as sources of relevant data. It follows that citizens’ privacy is potentially at risk while they drive, hence the need to model privacy threats in this application domain.
This paper addresses the privacy threats by updating a recent threat-modelling methodology and by tailoring it specifically to the soft privacy target property, which ensures citizens’ full control on their personal data. The methodology now features the sources of documentation as an explicit variable that is to be considered. It is demonstrated by including a new version of the de-facto standard LINDDUN methodology as well as an additional source by ENISA which is found to be relevant to soft privacy. The main findings are a set of 23 domain-independent threats, 43 domain-specific assets and 525 domain-dependent threats for the target property in the automotive domain. While these exceed their previous versions, their main value is to offer self-evident support to at least two arguments. One is that LINDDUN has evolved much the way our original methodology already advocated because a few of our previously suggested extensions are no longer outstanding. The other one is that ENISA’s treatment of privacy aboard smart cars should be extended considerably because our 525 threats fall in the same scope.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bella, G., Biondi, P., Tudisco, G.: A double assessment of privacy risks aboard top-selling cars. Automotive Innovation, pp. 1–18 (Jan 2023). https://doi.org/10.1007/s42154-022-00203-2
Chah, B., Lombard, A., Bkakria, A., Yaich, R., Abbas-Turki, A., Galland, S.: Privacy threat analysis for connected and autonomous vehicles. Procedia Comput. Sci. 210, 36–44 (2022). https://doi.org/10.1016/j.procs.2022.10.117, https://www.sciencedirect.com/science/article/pii/S1877050922015733, the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022) / Affiliated Workshops
Cybernews: Bmw exposes clients in italy (2023). https://cybernews.com/security/bmw-exposes-italy-clients/
Danezis, G.: Introduction to Privacy Technology (2008). http://www0.cs.ucl.ac.uk/staff/G.Danezis/talks/Privacy_Technology_cosic.pdf
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3–32 (Mar 2011). https://doi.org/10.1007/s00766-010-0115-7
ENISA: Threat Taxonomy (2016). https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
ENISA: Good Practices for Security of Smart Cars (2019). https://www.enisa.europa.eu/publications/smart-cars
Europe, A.N.: Tesla escapes fine from dutch watchdog after automaker alters security cameras (2023). https://europe.autonews.com/automakers/tesla-alters-cameras-avoid-dutch-fine-over-privacy-violations
Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 34. Microsoft Press (June 2006). https://doi.org/10.1007/s11623-010-0021-7
ISO: ISO/IEC 21434 - road vehicles - cybersecurity engineering (2021)
Law, B.: New us agency joins fray over massachusetts repair law, car data (2023). https://news.bloomberglaw.com/privacy-and-data-security/new-us-agency-joins-fray-over-massachusetts-repair-law-car-data
Microsoft: The STRIDE threat model (2009). https://learn.microsoft.com/en-us/previous-versions/commerce-server/ee823878%28v=cs.20
OWASP: Top 10 Privacy Risks (2021). https://owasp.org/www-project-top-10-privacy-risks/
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (Aug 2010). http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf
Raciti, M., Bella, G.: Github repository with complete outcomes (2023). https://github.com/tsumarios/Privacy-Threat-Modelling-Research/tree/main/SECPRE23
Raciti., M., Bella., G.: How to model privacy threats in the automotive domain. In: Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS, pp. 394–401. INSTICC, SciTePress (2023). https://doi.org/10.5220/0011998800003479
Raciti., M., Bella., G.: A threat model for soft privacy on smart cars. In: Proceedings of the 2nd Workshop on Automotive Cyber Security - ACSW (In press). https://doi.org/10.48550/arXiv.2306.04222
Reuters: Toyota’s indian unit warns of a possible customer data breach (2023). https://www.reuters.com/technology/toyotas-indian-unit-warns-possible-customer-data-breach-2023-01-01/
SAE: Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles (J3016_202104) (2021). https://www.sae.org/standards/content/j3016_201806/
Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
TechCrunch: Toyota Japan exposed millions of vehicles’ location data for a decade (2023). https://techcrunch.com/2023/05/12/toyota-japan-exposed-millions-locations-videos/
underscored, C.: The ring car cam takes ring’s great security smarts on the road (2023). https://edition.cnn.com/cnn-underscored/reviews/ring-car-cam
Van Landuyt, D., Joosen, W.: A descriptive study of assumptions made in linddun privacy threat elicitation. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1280–1287. SAC ’20, Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3341105.3375762
Vasenev, A., Stahl, F., Hamazaryan, H., Ma, Z., Shan, L., Kemmerich, J., Loiseaux., C.: Practical security and privacy threat analysis in the automotive domain: Long term support scenario for over-the-air updates. In: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS, pp. 550–555. INSTICC, SciTePress (2019). https://doi.org/10.5220/0007764205500555
Wang, Y., Wang, Y., Qin, H., Ji, H., Zhang, Y., Wang, J.: A systematic risk assessment framework of automotive cybersecurity. Automotive Innovation 4(3), 253–261 (Aug 2021). https://doi.org/10.1007/s42154-021-00140-6
Wuyts, K., Joosen, W.: Linddun privacy threat modeling: a tutorial (Jul 2015), technical Report (CW Reports)
Wuyts, K., Sion, L., Van Landuyt, D., Joosen, W.: Knowledge is power: systematic reuse of privacy knowledge for threat elicitation. In: 2019 IEEE Security and Privacy Workshops (SPW), pp. 80–83 (2019). https://doi.org/10.1109/SPW.2019.00025
Aknowledgements
Giampaolo Bella acknowledges financial support from: PNRR MUR project PE0000013-FAIR.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Raciti, M., Bella, G. (2024). Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14398. Springer, Cham. https://doi.org/10.1007/978-3-031-54204-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-54204-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54203-9
Online ISBN: 978-3-031-54204-6
eBook Packages: Computer ScienceComputer Science (R0)