Skip to main content

Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2012)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7613))

Included in the following conference series:

  • 2094 Accesses

Abstract

The purpose of this workshop contribution is the interaction between networked embedded systems (such as controllers, sensors and actuators within a motor vehicle) and how these can be simulated. It aims to assess the potential impacts of IT security incidents in advance and plan protective measures without having to build a complete prototype. The feasibility of recognizing and visualising possible dependencies and structural effects in a complex networked system with embedded components (in this example: A motor vehicle with CAN bus become more and more relevant. One exemplary reason is that in contrast to earlier times, now the vehicle manufacturers are acting just as a systems integrator of supply components. This could result in a leakage of the total understanding and a lost track of the networked system elements. This development is intensified by the growing number of control units, sensors and actuators, which make the complete testing of all system components and their dependencies almost impossible. Derived from this the need for a simulation model that represents these possible interactions as extensively as possible is obvious. In a first research step selected control devices on a CAN network, and related automotive sensors and actuators are modelled by simulation in order to simulate freely and selectable event sequences, e.g. to carry out as part of penetration testing to monitor possible weaknesses in the system and resulting interactions. On the latter, particular attention is given, as the security area is in the main application focus of this simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schramm, M.: Organic Computing - “Mr. Self-X ”- Wie Computer autonom werden. Bayern 2 (November 2010)

    Google Scholar 

  2. AnyLogic, http://www.xjtek.com/ (last access: September 23, 2011)

  3. Zimmermann, W., Schmidgall, R.: Bussysteme in der Fahrzeugtechnik: Protokolle und Standards, 2nd edn. Vieweg, Wiesbaden (2006)

    Google Scholar 

  4. Bauer, H.: Kraftfahrtechnisches Taschenbuch. Vieweg (2003)

    Google Scholar 

  5. Bauer, H., Dietsche, K.H., Zabler, E., Crepin, J.: Sensoren im Kraftfahrzeug, Bosch. Gelbe Reihe (2007)

    Google Scholar 

  6. Hoppe, T., Dittmann, J., Müter, M.: Decision Model for Automotive intrusion detection systems. In: Automotive - Safety & Security 2010 Sicherheit und Zuverlässigkeit für automobile Informationstechnik, Stuttgart, Juni 22-23. Shaker Verlag, Aachen (2010)

    Google Scholar 

  7. Dittmann, J., Hoppe, T., Kiltz, S., Tuchscheerer, S.: Elektronische Manipulation von Fahrzeug- und Infrastruktursystemen: Gefährdungspotentiale für die Straßenverkehrssicherheit, Paperback, 92 pages. Wirtschaftsverlag N. W. Verlag für neue Wissenschaft (2011) ISBN 978-3869181158

    Google Scholar 

  8. Da: Zulieferer werden für die Automobilindustrie immer wichtiger (July 6, 2001), http://www.welt.de/print-welt/article461473/ (last access: July 15, 2012)

  9. Kiltz, S., Hildebrand, M., Dittmann, J.: Forensische Datenarten und -analysen in automotiven Systemen. In: Horster, P. (ed.) D-A-CH Security 2009, Bochum, Deutschland, May 19-20, pp. 141–152 (2009) ISBN 978-3-00-027488-6

    Google Scholar 

  10. Hoppe, T., Holthusen, S., Tuchscheerer, S., Kiltz, S., Dittmann, J.: Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenhaltung. In: Sicherheit 2010 - Sicherheit, Schutz und Zuverlässigkeit, 5, October 5-7, pp. S.153–S.164. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V (GI), Berlin (2010)

    Google Scholar 

  11. Tuchscheerer, S., Hoppe, T., Dittmann, J., Pukall, M., Adamczyk, H.: Herausforderungen an die Absicherung von IT Systemen in der Entwicklung, Betrieb und Wartung von Fahrzeugen. In: Forschung und Innovation - Magdeburg: Univ., insges. 9 S., 2011 Kongress: Magdeburger Maschinenbau-Tage; 10 (Magdeburg), Buchbeitrag, September 27-29 (2011) ISBN 978-3-940961-60-0

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuhlmann, S., Fruth, J., Hoppe, T., Dittmann, J. (2012). Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation. In: Ortmeier, F., Daniel, P. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2012. Lecture Notes in Computer Science, vol 7613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33675-1_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33675-1_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33674-4

  • Online ISBN: 978-3-642-33675-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics