skip to main content
10.1145/3631991.3631994acmotherconferencesArticle/Chapter ViewAbstractPublication PageswsseConference Proceedingsconference-collections
research-article

Automotive Software Security Engineering based on the ISO 21434

Published:26 December 2023Publication History

ABSTRACT

The increasing use of software and connectivity in modern vehicles has made cybersecurity an important issue in the automotive industry. ISO 21434 is a standard for automotive cybersecurity engineering that provides guidelines for the development and validation of secure automotive systems. For effective implementation and practical use of ISO 21434, it must be incorporated into existing automotive industry development workflows.

In this paper, we investigate the practical applicability of ISO 21434 in the context of the Security Abstraction Model (SAM), a security modeling approach for the domain-specific modeling language EAST-ADL, and provide insights into the benefits and consequences of this approach. In doing so, we describe the methodological opportunities of integrating ISO 21434 into SAM on the one hand and present a case study illustrating the application of this integrated approach in the development of a secure automotive system on the other hand. Our results suggest that the integration of ISO 21434 into SAM better supports automotive system security in the early development phases and makes it transparent to a wide range of stakeholders. At the same time, it becomes clear that a representation of the interrelationships in the form of a metamodel, in contrast to ISO 21434 in which these are only described textually, significantly improves conceptual understanding and ultimately enables pragmatic usability in industrial development.

References

  1. Omar Y Al-Jarrah, Carsten Maple, Mehrdad Dianati, David Oxtoby, and Alex Mouzakitis. 2019. Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 7 (2019), 21266–21289.Google ScholarGoogle ScholarCross RefCross Ref
  2. Jozef Andraško, Ondrej Hamul’ák, Matúš Mesarčík, Tanel Kerikmäe, and Aleksi Kajander. 2021. Sustainable data governance for cooperative, connected and automated mobility in the European Union. Sustainability 13, 19 (2021), 10610.Google ScholarGoogle ScholarCross RefCross Ref
  3. Matthias Bergler, Juha-Pekka Tolvanen, and Ramin Tavakoli Kolagari. [n. d.]. Integrating Security and Safety with Systems Engineering: a Model-Based Approach. ([n. d.]).Google ScholarGoogle Scholar
  4. Matthias Bergler, Juha-Pekka Tolvanen, Markus Zoppelt, and Ramin Tavakoli Kolagari. 2021. Social Engineering Exploits in Automotive Software Security: Modeling Human-targeted Attacks with SAM. In 31st European Safety and Reliability Conference, ESREL 2021. 2502–2509.Google ScholarGoogle Scholar
  5. Philippe Cuenot, Patrick Frey, Rolf Johansson, Henrik Lönn, Yiannis Papadopoulos, Mark-Oliver Reiser, Anders Sandberg, David Servat, Ramin Tavakoli Kolagari, Martin Törngren, 2010. The east-adl architecture description language for automotive embedded software. In Model-Based Engineering of Embedded Real-Time Systems: International Dagstuhl Workshop, Dagstuhl Castle, Germany, November 4-9, 2007. Revised Selected Papers. Springer, 297–307.Google ScholarGoogle ScholarCross RefCross Ref
  6. Subasish Das, Srinivas R Geedipally, Karen Dixon, Xiaoduan Sun, and Chaolun Ma. 2019. Measuring the effectiveness of vehicle inspection regulations in different states of the US. Transportation research record 2673, 5 (2019), 208–219.Google ScholarGoogle Scholar
  7. Tian Guan, Yi Han, Nan Kang, Ningye Tang, Xu Chen, and Shu Wang. 2022. An overview of vehicular cybersecurity for intelligent connected vehicles. Sustainability 14, 9 (2022), 5211.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ondrej Hamulák, Josef Andraško, and Matús Mesarcik. 2021. The digital development of the European Union: data governance aspects of cooperative, connected and automated mobility. IDP: revista de Internet, derecho y política= revista d’Internet, dret i política34 (2021), 7.Google ScholarGoogle Scholar
  9. Feng Luo, Yifan Jiang, Zhaojing Zhang, Yi Ren, and Shuo Hou. 2021. Threat analysis and risk assessment for connected vehicles: A survey. Security and Communication Networks 2021 (2021), 1–19.Google ScholarGoogle Scholar
  10. Georg Macher, Christoph Schmittner, Omar Veledar, and Eugen Brenner. 2020. ISO/SAE DIS 21434 automotive cybersecurity standard-in a nutshell. In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops: DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings 39. Springer, 123–135.Google ScholarGoogle Scholar
  11. Maenad Manead. 2021. About. http://www.maenad.eu/Google ScholarGoogle Scholar
  12. Peter Mell, Karen Scarfone, and Sasha Romanosky. 2006. Common vulnerability scoring system. IEEE Security & Privacy 4, 6 (2006), 85–89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Seunghyun Park and Jin-Young Choi. 2020. Malware detection in self-driving vehicles using machine learning algorithms. Journal of advanced transportation 2020 (2020), 1–9.Google ScholarGoogle ScholarCross RefCross Ref
  14. Brandon Schoettle and Michael Sivak. 2014. A survey of public opinion about connected vehicles in the US, the UK, and Australia. In 2014 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 687–692.Google ScholarGoogle ScholarCross RefCross Ref
  15. Juha-Pekka Tolvanen and Matti Rossi. 2003. Metaedit+ defining and using domain-specific modeling languages and code generators. In Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. 92–93.Google ScholarGoogle Scholar
  16. Hatice Sonmez Turel, Emine Malkoc Yigit, and Ipek Altug. 2007. Evaluation of elderly people’s requirements in public open spaces: A case study in Bornova District (Izmir, Turkey). Building and Environment 42, 5 (2007), 2035–2045.Google ScholarGoogle ScholarCross RefCross Ref
  17. UNECE UNECE. 2021. UN Regulation No. 155 - cyber security and Cyber Security Management System. https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-and-cyber-securityGoogle ScholarGoogle Scholar
  18. UNECE UNECE. 2021. UN Regulation No. 156 - software update and software update management system. https://unece.org/transport/documents/2021/03/standards/un-regulation-no-156-software-update-and-software-updateGoogle ScholarGoogle Scholar
  19. Yunpeng Wang, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. 2021. A systematic risk assessment framework of automotive cybersecurity. Automotive Innovation 4 (2021), 253–261.Google ScholarGoogle ScholarCross RefCross Ref
  20. Markus Zoppelt and Ramin Tavakoli Kolagari. 2019. SAM: a security abstraction model for automotive software systems. In Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers. Springer, 59–74.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Automotive Software Security Engineering based on the ISO 21434

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WSSE '23: Proceedings of the 2023 5th World Symposium on Software Engineering
        September 2023
        352 pages
        ISBN:9798400708053
        DOI:10.1145/3631991

        Copyright © 2023 ACM

        Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 December 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)63
        • Downloads (Last 6 weeks)28

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format