Proceedings of the 4th ACM Workshop on Cyber-Physical System Security 2018
DOI: 10.1145/3198458.3198465
|View full text |Cite
|
Sign up to set email alerts
|

Sara

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 14 publications
0
20
0
Order By: Relevance
“…As an extension to EVITA, RACE also improves the EVITA attack tree to include a brief and practical description of the attack. Monteuuis et al [ 42 ] proposed a systematic threat analysis and risk assessment framework called SARA. This framework includes improved threat models, new attack methods/asset graphs, attacker profiles, and a new metrics called observations.…”
Section: Related Workmentioning
confidence: 99%
“…As an extension to EVITA, RACE also improves the EVITA attack tree to include a brief and practical description of the attack. Monteuuis et al [ 42 ] proposed a systematic threat analysis and risk assessment framework called SARA. This framework includes improved threat models, new attack methods/asset graphs, attacker profiles, and a new metrics called observations.…”
Section: Related Workmentioning
confidence: 99%
“…ANP (i.e., analytical network process) is a matrix approach that can effectively consider dependencies and conflicts between attributes for joint evaluation [ 16 ]. Attacker-based methods, such as SARA (i.e., security automotive risk analysis) [ 17 ], conduct threat analysis and risk assessment based on the knowledge level of possible attackers, attack paths, attack motivations, and resources possessed. SAM (i.e., security abstraction model) [ 18 ] combines safety management and model-based system engineering through an abstract description of automotive security modeling.…”
Section: Related Workmentioning
confidence: 99%
“…In some cases, instead of reducing the capabilities and access rights of system components at risk, the inverse strategy is used: granting these components additional privileges to be able to recover (Yoon et al, 2017), or scheduling an inspection and informing users of the risk (Teimourikia and Fugini, 2017). In addition to increasing the security level, proposed strategies include the anonymization of communication and messages (Monteuuis et al, 2018), e.g. to prevent the leaking of confidential and personal data.…”
Section: Adaptation Strategiesmentioning
confidence: 99%