2024
DOI: 10.1145/3644075
|View full text |Cite
|
Sign up to set email alerts
|

Combining Cyber Security Intelligence to Refine Automotive Cyber Threats

Florian Sommer,
Mona Gierl,
Reiner Kriesten
et al.

Abstract: Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…We provide a generalisable example of using the extended TRADES Tool to curate security-related information from multiple sources. We discuss the mapping of a specific threat-threat #6 of the United Nations' vehicle cyber security regulation (henceforth: UN-T6) [24]-to CAPEC and ATT&CK information, based on the work by Sommer et al [11]. We selected this particular threat's mapping due to the relatively low number of mappings to CAPEC and ATT&CK (as identified originally by Sommer et al), which allows us to concisely demonstrate our contribution to representing and improving the mapping, without overloading the reader.…”
Section: Curating Security Guidance From Multiple Knowledge Basesmentioning
confidence: 99%
See 4 more Smart Citations
“…We provide a generalisable example of using the extended TRADES Tool to curate security-related information from multiple sources. We discuss the mapping of a specific threat-threat #6 of the United Nations' vehicle cyber security regulation (henceforth: UN-T6) [24]-to CAPEC and ATT&CK information, based on the work by Sommer et al [11]. We selected this particular threat's mapping due to the relatively low number of mappings to CAPEC and ATT&CK (as identified originally by Sommer et al), which allows us to concisely demonstrate our contribution to representing and improving the mapping, without overloading the reader.…”
Section: Curating Security Guidance From Multiple Knowledge Basesmentioning
confidence: 99%
“…The specific representation of UN-T6 mapping can, for example, raise a question with the viewer/reader as to the possible exploitation of ATT&CK to address the CAPEC Content Spoofing pattern. This gap is not communicated by the original textual/table orientation of the mapping [11]. If one methodically looks into the mapping method then-since the specific CAPEC pattern suggests a mapping to an ATT&CK technique-there should be a mapping between the CAPEC pattern into the relevant ATT&CK technique, and this can possibly lead to some ATT&CK-derived mitigation guidance.…”
Section: Curating Security Guidance From Multiple Knowledge Basesmentioning
confidence: 99%
See 3 more Smart Citations