Projekte pro Jahr
Abstract
Consumer demands for advanced automotive assistant systems and connectivity of cars to the internet make cyber-security an important requirement for vehicle providers. As vehicle providers gear up for the cyber security challenges, they can leverage experiences from many other domains, but nevertheless, must face several unique challenges. Thus, several security standards are well established and do not need to be created from scratch. The recently released SAE J3061 guidebook for cyber-physical vehicle systems provides information and high-level principles for automotive organizations to identify and assess cyber-security threats and design cyber-security aware systems.
In the course of this document, a review of available threat analysis methods and the recommendations of the SAE J3061 guidebook regarding threat analysis and risk assessment method (TARA) is given. The aim of this work is to provide a position statement for the discussion of available analysis methods and their applicability for early development phases in context of ISO 26262 and SAE J3061.
Keywords
TARAISO 26262SAE J3061AutomotiveSecurity analysis
In the course of this document, a review of available threat analysis methods and the recommendations of the SAE J3061 guidebook regarding threat analysis and risk assessment method (TARA) is given. The aim of this work is to provide a position statement for the discussion of available analysis methods and their applicability for early development phases in context of ISO 26262 and SAE J3061.
Keywords
TARAISO 26262SAE J3061AutomotiveSecurity analysis
Originalsprache | englisch |
---|---|
Titel | International Conference on Computer Safety, Reliability, and Security |
Untertitel | SAFECOMP 2016 |
Herausgeber (Verlag) | Springer International Publishing AG |
Seiten | 130 |
Seitenumfang | 141 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2016 |
Publikationsreihe
Name | Lecture Notes in Computer Science |
---|---|
Herausgeber (Verlag) | Springer |
Band | 9922 2016 |
Fields of Expertise
- Information, Communication & Computing
- Mobility & Production
Fingerprint
Untersuchen Sie die Forschungsthemen von „A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context“. Zusammen bilden sie einen einzigartigen Fingerprint.-
Industrial Informatics
Macher, G., Dobaj, J., Krug, T., Blažević, R. & Veledar, O.
1/09/12 → 31/12/24
Projekt: Arbeitsgebiet
-
VIF-MEMCONS - MOdel-based EMbedded CONtrol Software
Kreiner, C. J. & Macher, G.
1/01/13 → 31/12/15
Projekt: Forschungsprojekt
Aktivitäten
- 1 Vortrag bei Konferenz oder Fachtagung
-
SafeComp'16 - International Conference on Computer Safety, Reliability and Security
Christian Josef Kreiner (Redner/in)
2016Aktivität: Vortrag oder Präsentation › Vortrag bei Konferenz oder Fachtagung › Science to science