2021
DOI: 10.1007/978-3-030-68887-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Security Assessment and Hardening of Autonomous Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The GTS (i.e., graph transformation system) method is a formal method of transforming the system structure graph, which can easily and quickly realize the conversion between the overall architecture and the module architecture [ 27 ]. UMLsec (i.e., Unified Modeling Language Security), a UML extension, has been used for model-based security engineering in distributed information systems [ 28 , 29 ]. Shah et al [ 30 ] present a method of automatically creating a model transformation based on the original UML2Alloy transformation.…”
Section: Related Workmentioning
confidence: 99%
“…The GTS (i.e., graph transformation system) method is a formal method of transforming the system structure graph, which can easily and quickly realize the conversion between the overall architecture and the module architecture [ 27 ]. UMLsec (i.e., Unified Modeling Language Security), a UML extension, has been used for model-based security engineering in distributed information systems [ 28 , 29 ]. Shah et al [ 30 ] present a method of automatically creating a model transformation based on the original UML2Alloy transformation.…”
Section: Related Workmentioning
confidence: 99%
“…UML use cases and state machines can be used to represent attack scenarios. In [30], a UML-based metamodel is developed specifically for autonomous vehicles, attacks, and defense measures. UML-based analysis methods have many advantages.…”
Section: Yesmentioning
confidence: 99%
“…No UML-based model [30] is method proposes a formal framework to detect attack surfaces automatically on systems modeled in UML. e formal expression is clear and will not cause ambiguity.…”
Section: Nomentioning
confidence: 99%