Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2015 2015
DOI: 10.7873/date.2015.0622
|View full text |Cite
|
Sign up to set email alerts
|

SAHARA: A Security-Aware Hazard and Risk Analysis Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 128 publications
(61 citation statements)
references
References 0 publications
0
61
0
Order By: Relevance
“…We also proposed an approach of a security-informed hazard analysis and describe an assessment process determining the impact of security attacks on safety features [16]. This work presented a combined approach of the automotive HARA (hazard analysis and risk assessment) with the security domain STRIDE.…”
Section: Related Workmentioning
confidence: 99%
“…We also proposed an approach of a security-informed hazard analysis and describe an assessment process determining the impact of security attacks on safety features [16]. This work presented a combined approach of the automotive HARA (hazard analysis and risk assessment) with the security domain STRIDE.…”
Section: Related Workmentioning
confidence: 99%
“…Since all dependability attributes need to be supported by the same system architecture, they require a common engineering basis and a mutual understanding of focuses, language concepts and mutual dependencies. Table 1 shows a mapping of safety and security oriented engineering terms regarding the initial analysis step, which is the HARA and TARA [15]. Most modern embedded automotive systems are representative of safety and security relevant use-cases, due to their usually safety and security related nature and complexity regarding elements of the system, underlying functionality and the related external systems.…”
Section: Figure 1 Overview Of Dependability Attributes and Analysismentioning
confidence: 99%
“…This system is connected to various powertrain control units, the charging interface (enabling the communication with battery charging stations), the on-board diagnostic interface (OBD), and via a dedicated gateway to the vehicle infotainment systems (including the driver interface (HMI) and also a wireless internet connection). For the initial assessment of cyber-security threats and safety hazards the SAHARA method [15] can be applied. This method identifies safety goals (SG) and cyber-security attacks which can violate the respective SG.…”
Section: Application Of the Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, several methods for risk identification, evaluation and analysis eliciting both safety hazards and security threats have been proposed such as SAHARA [1], CHASSIS [2], FMVEA [3]. A majority of them, are application specific models (automotive, power) and geared towards the risk identification phase.…”
Section: Introductionmentioning
confidence: 99%