127 results on '"Christoph Schmittner"'
Search Results
52. Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective.
- Author
-
Binbin Chen 0001, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, and William H. Sanders
- Published
- 2015
- Full Text
- View/download PDF
53. Towards a Framework for Alignment Between Automotive Safety and Security Standards.
- Author
-
Christoph Schmittner and Zhendong Ma
- Published
- 2015
- Full Text
- View/download PDF
54. A Case Study of FMVEA and CHASSIS as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems.
- Author
-
Christoph Schmittner, Zhendong Ma, Erwin Schoitsch, and Thomas Gruber 0004
- Published
- 2015
- Full Text
- View/download PDF
55. Security Application of Failure Mode and Effect Analysis (FMEA).
- Author
-
Christoph Schmittner, Thomas Gruber 0004, Peter P. Puschner, and Erwin Schoitsch
- Published
- 2014
- Full Text
- View/download PDF
56. FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.
- Author
-
Christoph Schmittner, Zhendong Ma, and Paul Smith 0001
- Published
- 2014
- Full Text
- View/download PDF
57. A Systematic Approach to Automotive Security
- Author
-
Masoud Ebrahimi, Stefan Marksteiner, Dejan Ničković, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, and Sandra König
- Published
- 2023
58. A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems
- Author
-
Sebastian Chlup, Thomas Raab, Edvin Spahovic, Thomas Doms, Klaus Pollhammer, Carina Kloibhofer, Christoph Schmittner, Markus Hofer, Martin Latzenhofer, Rainer Seyer, Stefan Rührup, Tom Vogt, Arndt Bonitz, and Heinz Weiskirchner
- Subjects
Risk analysis (engineering) ,Computer Networks and Communications ,business.industry ,Computer science ,Automotive Engineering ,Information security ,Safety, Risk, Reliability and Quality ,Risk assessment ,business ,Intelligent transportation system ,Risk management ,Computer Science Applications ,Information Systems - Published
- 2021
59. Risk Management and Standard Compliance for Cyber-Physical Systems of Systems
- Author
-
Abdelkader Magdy Shaaban, Christoph Schmittner, Markus Tauber, Sebastian Chlup, George Matta, Elke Szalai, and Andreas Pinzenöhler
- Subjects
General Computer Science ,Risk analysis (engineering) ,business.industry ,Cyber-physical system ,Business ,Electrical and Electronic Engineering ,Risk management ,Compliance (psychology) - Abstract
The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.
- Published
- 2021
60. Automated Ontology-Based Security Requirements Identification for the Vehicular Domain
- Author
-
Gerald Quirchmayr, Abdelkader Magdy Shaaban, Erich Schikuta, Christoph Schmittner, Thomas Gruber, and A. Baith Mohamed
- Subjects
Set (abstract data type) ,Functional safety ,Identification (information) ,Work (electrical) ,Computer science ,Control (management) ,Logical rules ,Ontology (information science) ,Computer security ,computer.software_genre ,computer ,Domain (software engineering) - Abstract
Many electronic and electrical systems are now incorporated with modern vehicles to control functional safety. Lack of security protection mechanisms in vehicular design may lead to different ways of executing malicious attacks against the vehicular network. These attacks may have various types of negative consequences, such as safe vehicle operation. This work presents an ontology-based framework as a new automated approach to verify and validate security requirements against security issues in the vehicular domain. The system also applies a set of logical rules to identify a set of security requirements as a category of necessary security requirements that could be proposed to be integrated within the vehicle design to address a specific security issue.
- Published
- 2020
61. A recommendation for suitable technologies for an indoor farming framework
- Author
-
Johannes Knapitsch, Markus Tauber, Martin Parapatits, Harald Pichler, Korbinian Christl, Christoph Schmittner, and Clemens Gnauer
- Subjects
IoT ,Service (systems architecture) ,010504 meteorology & atmospheric sciences ,Computer science ,business.industry ,cloud computing ,Vertical farming ,Cloud computing ,02 engineering and technology ,Environmental economics ,vertical farming ,01 natural sciences ,Unit (housing) ,Effects of global warming ,Agriculture ,Information and Communications Technology ,0202 electrical engineering, electronic engineering, information engineering ,Food processing ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,indoor farming ,0105 earth and related environmental sciences - Abstract
Facing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.
- Published
- 2020
62. Co-engineering of Safety and Security Life Cycles for Engineering of Automotive Systems
- Author
-
Robert Bramberger, Barbara Gallina, Helmut Martin, and Christoph Schmittner
- Subjects
Computer science ,Process (engineering) ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Phase (combat) ,Sketch ,Work (electrical) ,Automotive systems ,Risk analysis (engineering) ,Brainstorming ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Process line ,General Environmental Science - Abstract
Nowadays systems are becoming more and more connected. Consequently, the co-engineering of (cyber)security and safety life cycles becomes paramount. Currently, no standard provides a structured co-engineering process to facilitate the communication between safety and security engineers. In this paper, we propose a process for co-engineering safety and security by the explicit systematization and management of commonalities and variabilities, implicitly stated in the requirements of the different standards. Our process treats the safety and security life cycles as members of a security-informed safety-oriented process line and so it forces safety and security engineers to come together and brainstorm on what might be considered a commonality and what might be considered a variability. We illustrate the usage of our process by systematizing commonalities and variabilities at risk analysis phase in the context of ISO 26262 and SAE J3061. We then draw lessons learnt. Finally, we sketch some directions for future work.
- Published
- 2020
63. Application of a Generic Digital Twin for Risk and Resilience Assessment in Critical Infrastructures
- Author
-
Stefan Schauer, Martin Latzenhofer, Sandra König, Sebastian Chlup, Christoph Schmittner
- Published
- 2022
- Full Text
- View/download PDF
64. Standardization challenges for safety and security of connected, automated and intelligent vehicles.
- Author
-
Christoph Schmittner, Zhendong Ma, and Thomas Gruber 0004
- Published
- 2014
- Full Text
- View/download PDF
65. Ontology-Based Security Requirements Framework for Current and Future Vehicles
- Author
-
A. Baith Mohamed, Christoph Schmittner, Gerald Quirchmayr, Erich Schikuta, Abdelkader Magdy Shaaban, and Thomas Gruber
- Subjects
Work (electrical) ,Knowledge representation and reasoning ,Computer science ,Automotive manufacturing ,Ontology (information science) ,Security level ,Engineering design process ,Computer security ,computer.software_genre ,computer ,Verification and validation - Abstract
Vehicular engineering process aims to develop a secure and safe vehicle with a high level of safety-security assurance. Safety and security are considered two sides of the identical coin. Therefore, improving security in automotive manufacturing is necessary to protect the vehicle from various attack scenarios that threaten safety. Consequently, cybersecurity requires to be a part of the development phases of the vehicular industry. The significant challenge is how to manage hundreds or thousands of vehicular data related to all components, threats, vulnerabilities, and protection profiles. The traditional security verification and validation approaches could miss some of the security flaws, which leads to a threat to the whole vehicle. This work aims to introduce a vehicular security verification and validation model. The model is an ontology-based approach that aims to create a knowledge representation of the vehicular components, assets, threats, and others with all related data. Then it performs verification and validation to determine whether or not the security requirements met under the actual security conditions. Additionally, the model improves the security level of the vehicle by choosing further security requirements.
- Published
- 2021
66. Towards a secure and self-adapting smart indoor farming framework
- Author
-
Clemens Gnauer, Johannes Knapitsch, Martin Parapatits, Korbinian Christl, Christoph Schmittner, Markus Tauber, and Harald Pichler
- Subjects
robotics ,IoT ,business.industry ,Computer science ,020209 energy ,cloud computing ,020206 networking & telecommunications ,Vertical farming ,Robotics ,Cloud computing ,02 engineering and technology ,World population ,vertical farming ,Software ,Risk analysis (engineering) ,Agriculture ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Food processing ,Artificial intelligence ,Electrical and Electronic Engineering ,business - Abstract
Facing the increase in world population and the stagnation in available arable land there is a high demand for optimizing the food production. Considering the world-wide and ongoing reduction of the agricultural labor force novel approaches for food production are required. Vertical farming may be such a solution where plants are being produced indoors in racks, cared by robotic appliances which will be operated by specialized software. Given the multitude of parameters which determine the ideal condition, a lot of data needs to be acquired. As this data is used to adapt the entire Cyber-Physical System to a changing environment the data has to be secure and adaptations have to consider safety aspects as well. Such systems must hence be secure, safe, scalable and self-adaptable to a high degree. We present an important element for such solutions, a cloud, IoT and robotic based smart farming framework. Forschung Burgenland Informationstechnologie und Informationsmanagement
- Published
- 2019
67. Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard
- Author
-
Nahla Elaraby, Christoph Schmittner, Abdelkader Magdy Shaaban, and Sebastian Chlup
- Subjects
Fluid Flow and Transfer Processes ,Process Chemistry and Technology ,General Engineering ,security measures ,potential threats ,attack propagation ,IoT ,cybersecurity ,security standard ,General Materials Science ,Instrumentation ,Computer Science Applications - Abstract
Implementing applicable security measures into system engineering applications is still one of the most challenging processes in building secure infrastructure. This process needs to consider a variety of security attributes to support securing system components against numerous cyberattacks that could exploit vulnerable points in the system. The redundancy in these attributes is also another challenge that could degrade system functionality and impact the availability of the system’s services. Therefore, it is crucial to choose appropriate security properties by considering their ability to address cyber threats with minimal negative impacts on the system’s functionality. This process is still subjected to inconsistencies due to ad- oc determinations by a specialist. In this work, we propose a novel algorithm for optimizing the implementation of security mechanisms in IoT applications for the agricultural domain to ensure the effectiveness of the applied mechanisms against the propagation of potential threats. We demonstrate our proposed algorithm on an IoT application in the farming domain to see how the algorithm helps with optimizing the applied security mechanisms. In addition, we used THREATGET to analyze cyber risks and validate the optimized security attributes against the propagation of cyber threats.
- Published
- 2022
68. Automotive Cybersecurity - Training the Future
- Author
-
Abdelkader Magdy Shaaban, Richard Messnarz, Alexander Much, Jakub Stolfa, Alen Salamun, Georg Macher, Jan Plucar, Marek Spanyik, Christoph Schmittner, Damjan Ekert, and Svatopluk Stolfa
- Subjects
Software ,business.industry ,Adaptive behaviour ,Computer science ,Automotive industry ,Computer security ,computer.software_genre ,business ,computer ,Erasmus+ ,Training (civil) ,Domain (software engineering) - Abstract
The automotive domain is moving towards connected and automated vehicles [13] with a high degree of dynamic and adaptive behaviour, driven by software. Due to this connectivity and interaction, cybersecurity is an increasingly important topic. In the future automotive cybersecurity will also play an important role in the type approval. We present here the first results of a European Erasmus+ project, aiming at the development of training for automotive cybersecurity.
- Published
- 2021
69. Steering Drivers of Change: Maximising Benefits of Trustworthy IoT
- Author
-
Stefan Marksteiner, Christian Derler, Lukas Krammer, Eric Armengaud, Heinz Weiskirchner, Stefan Jaksic, Christoph Schmittner, Kay Römer, Martin Matschnig, Peter Priller, Sebastian Ramacher, Christian Lettner, Omar Veledar, Christina Tiefnig, Violeta Damjanovic-Behrendt, Georg Macher, Heribert Vallant, Andreas Martin, Leo Botler, and Mario Drobics
- Subjects
Process management ,Process (engineering) ,business.industry ,Computer science ,Value proposition ,Sustainability ,Automotive industry ,Digital transformation ,Strategic management ,business ,Phase (combat) ,Variety (cybernetics) - Abstract
The collaborative activities of a diverse range of partners have resulted in a variety of assets directed towards trustworthy IoT and its integration into autonomous driving and Industry 4.0 applications. This paper strays away from technical development. Its motive is to establish a process and define an adequate set of high-level generic measures that could be implemented to support digital transformation beyond the project’s closing phase. The focus is placed on successful exploitation with a sustainable outlook for the project results in a quest to maximise benefits for a range of stakeholders. To that extent, the paper considers the realistic maximisation of benefits through the implementation of a strategy to improve the value proposition. These activities are prolonging and maximising the impact of the project.
- Published
- 2021
70. Ongoing Cybersecurity and Safety Standardization Activities Related to Highly Automated/Autonomous Vehicles
- Author
-
Erwin Schoitsch and Christoph Schmittner
- Subjects
060201 languages & linguistics ,Functional safety ,Standardization ,Computer science ,business.industry ,media_common.quotation_subject ,Automotive industry ,06 humanities and the arts ,02 engineering and technology ,Commission ,Certification ,Vehicle-to-vehicle ,Computer security ,computer.software_genre ,Work (electrical) ,13. Climate action ,Perception ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,media_common - Abstract
Highly automated/autonomous vehicles using extended features like Vehicle to Vehicle (V2V) or Vehicle to Infrastructure (V2I), cognitive systems for decision taking, needing extensive perception features and sophisticated sensor functions, cause a considerable shift in safety and cybersecurity (trustworthiness) co-engineering and assurance. To achieve trust of the public/users, standards and certification/qualification are challenged, not comparable to conventional “singular vehicle only” issues. The paper highlights the necessary evolution in the automotive and related standardization landscape, including ethics guidelines and recent activities, and the consequences from upcoming UNECE (United Nations Economic Commission for Europe) regulations. An Overview on ongoing work in large European ECSEL projects, SECREDAS and AutoDrive, including standardization, is provided.
- Published
- 2020
71. CPS Road Network Scenarios Analysed for Dependability and Standardization
- Author
-
Eric Armengaud, Georg Macher, Jürgen Dobaj, Christoph Schmittner, Arndt Bonitz, and Omar Veledar
- Subjects
Service (systems architecture) ,Standardization ,Risk analysis (engineering) ,Work (electrical) ,Computer science ,Dependability ,Special needs ,Permission ,Traffic flow ,Intelligent transportation system - Abstract
Infrastructure planning of transport and mobility is a very complex and challenging issue for planners and decision-makers. Cooperative Intelligent Transport Systems (C-ITS) allow here not only improved information and planning in singular vehicle but optimization of the overall traffic and consideration of special needs. Understanding the design, structure and integration of the necessary infrastructure and other road users must become an integral part of developing modern vehicles and modern infrastructures. There are already existing concepts for special service permission for accessing road and traffic services which can improve public safety, decrease the environmental impact and improve the overall traffic flow. In this work, we analyse a CPS road network scenario, with both general and emergency processes, where vehicles and infrastructure are able to communicate with each other concerning dependability. We highlight challenges and propose building blocks towards a holistic system engineering method. Furthermore, we give a short overview of state-of-the-art methods proposed by standards and discuss their shortcomings concerning the raised dependability issues.
- Published
- 2020
72. An Integrated View on Automotive SPICE, Functional Safety and Cyber-Security
- Author
-
Eric Armengaud, Christoph Schmittner, Georg Macher, Richard Messnarz, and Jürgen Dobaj
- Subjects
Functional safety ,Computer science ,Automotive spice ,Computer security ,computer.software_genre ,computer - Published
- 2020
73. ISO/SAE DIS 21434 Automotive Cybersecurity Standard - In a Nutshell
- Author
-
Christoph Schmittner, Georg Macher, Omar Veledar, and Eugen Brenner
- Subjects
Security analysis ,Standardization ,Joint working ,business.industry ,Computer science ,Information sharing ,Industry standard ,Automotive industry ,02 engineering and technology ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,Hacker - Abstract
A range of connected and automated vehicles is already available, which is intensifying the usage of connectivity features and information sharing for vehicle maintenance and traffic safety features. The resulting highly connected networking amplifies the attractiveness level for attacks on vehicles and connected infrastructure by hackers with different motivations. Hence, the newly introduced cybersecurity risks are attracting a range of mitigating strategies across the automotive field. The industry’s target is to design and deliver safe and secure connected and automated vehicles. Therefore, efforts are being poured into developing an industry standard capable of tackling automotive cybersecurity issues and protecting assets. The joint working group of the standardization organizations ISO and SAE have recently established and published a draft international specification of the “ISO/SAE DIS 21434 Road Vehicles - Cybersecurity Engineering” standard.
- Published
- 2020
74. Combined automotive safety and security pattern engineering approach
- Author
-
Helmut Martin, Christian Kreiner, Zehndong Ma, Bernhard Winkler, Daniel Schneider, Martin Krammer, Christoph Schmittner, Georg Macher, Tiago Amorim, and Publica
- Subjects
021110 strategic, defence & security studies ,021103 operations research ,Computer science ,business.industry ,0211 other engineering and technologies ,Automotive industry ,Poison control ,Cloud computing ,Context (language use) ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Workflow ,Security pattern ,Risk analysis (engineering) ,Safety engineering ,Use case ,Safety, Risk, Reliability and Quality ,business ,ddc:006 - Abstract
Automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or bane - it greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cybersecurity becomes important as additional concern because attacks are now much more likely and severe. However, there is a lack of experience with security concerns in context of safety engineering in general and in automotive safety departments in particular. To address this problem, we propose a systematic pattern-based approach that interlinks safety and security patterns and provides guidance with respect to selection and combination of both types of patterns in context of system engineering. A combined safety and security pattern engineering workflow is proposed to provide systematic guidance to support non-expert engineers based on best practices. The application of the approach is shown and demonstrated by an automotive case study and different use case scenarios.
- Published
- 2020
75. Automated Right of Way for Emergency Vehicles in C-ITS: An Analysis of Cyber-Security Risks
- Author
-
Stefan Ruehrup, Arndt Bonitz, Lucie Langer, and Christoph Schmittner
- Subjects
Risk analysis ,Process (engineering) ,Computer science ,05 social sciences ,Right of way ,Preemption ,Time loss ,02 engineering and technology ,050905 science studies ,Computer security ,computer.software_genre ,Emergency vehicle ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0509 other social sciences ,Intelligent transportation system ,computer ,Road user - Abstract
Cooperative Intelligent Transport Systems (C-ITS) provide comprehensive information and communication services to enable a more efficient and safe use of transport systems. Emergency vehicles can benefit from C-ITS by sending preemption requests to traffic lights or other connected road users, thus reducing their time loss when approaching an emergency. This, however, depends on a secure and reliable communication between all involved parties. Potential risks involve cyber-attacks and acts of sabotage. A major issue is the security process applied to provide C-ITS vehicles with the authorisations to exercise the right of way intended for emergency vehicles.
- Published
- 2020
76. Preliminary Considerations for a Cooperative Intelligent Transport System Cybersecurity Reference Architecture
- Author
-
Thomas Doms, Edvin Spahovic, Carina Kloibhofer, Markus Hofer, Thomas Raab, Christoph Schmittner, Martin Latzenhofer, Sebastian Chlup, and Arndt Bonitz
- Subjects
business.industry ,Computer science ,Harmonization ,Computer security ,computer.software_genre ,Original equipment manufacturer ,Identification (information) ,Component (UML) ,Accountability ,Confidentiality ,Reference architecture ,business ,computer ,Risk management - Abstract
Cyber security and privacy are major challenges for interconnected automatic driving cars which rely on confidentiality, integrity, availability, authenticity, accountability as well as privacy of a cooperative intelligent transport system (C-ITS). The cars require detailed data about the environment on different levels to generate a comprehensive overview of the current traffic situation in real time to ensure their safe and secure movement. The availability, integrity, authenticity and accountability of data and its processing are a prerequisite for automated and interconnected driving. Additionally, confidentiality and privacy are main requirements for using C-ITS services. Cyber security is not only necessary for an efficient traffic management. Co-operative functions and coordinative autonomy is mandatory, since successful intentional attacks on a C-ITS in fact threaten human lives. There is a fundamental need for a comprehensive harmonization of safety and security aspects from the infrastructure provider's perspective to ensure awareness and trust - and not solely from an original equipment manufacturer's (OEM) view. Especially cyber security is essential to make these cooperative traffic structures and autonomous interconnected driving technologies confidently available to society. In this paper, the approach for component identification, scoping, use case development, and the applied risk management method as preliminary work for the development of a comprehensive C-ITS cybersecurity reference framework is discussed. These steps are part of a currently ongoing research project.
- Published
- 2019
77. Automotive Cybersecurity Standards - Relation and Overview
- Author
-
Georg Macher and Christoph Schmittner
- Subjects
Attractiveness ,Security analysis ,Relation (database) ,Computer science ,business.industry ,Information sharing ,020208 electrical & electronic engineering ,Automotive industry ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Hacker - Abstract
Today many connected and automated vehicles are available and connectivity features and information sharing is increasingly used for additional vehicle-, maintenance- and traffic safety features. This highly connected networking also increase the attractiveness of an attack on vehicles and the connected infrastructure by hackers with different motivations and thus introduces new risks for vehicle cybersecurity.
- Published
- 2019
78. Security Safety and Organizational Standard Compliance in Cyber Physical Systems
- Author
-
Ani Bicaku, Patrick Rottmann, Jerker Delsing, Christoph Schmittner, and Markus Tauber
- Subjects
safety ,Other Electrical Engineering, Electronic Engineering, Information Engineering ,General Computer Science ,Computer science ,Interoperability ,Cyber-physical system ,standard ,Computer security ,computer.software_genre ,compliance ,Compliance (psychology) ,monitoring ,Cyber Physical Systems ,Security ,organizational ,Production (economics) ,Annan elektroteknik och elektronik ,Electrical and Electronic Engineering ,Electronic systems ,computer - Abstract
In Industry 4.0 independent entities should interoperate to allow flexible and customized production. To assure the parties that individual components are secured to inter-operate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements for which measurable indicator points are derived. Those reflect configurations of systems recommended by security, safety or process management relevant standards and guidelines, which help to demonstrate the state of compliance. We propose in this paper an approach to automate such an assessment when components are inter-operating with each other by using a monitoring and standard compliance verification framework. The framework will assure the parties that services or devices within their organizations operate in a secure and standard compliant way, without compromising the underlying infrastructure. Godkänd;2020;Nivå 0;2020-08-25 (alebob)
- Published
- 2019
79. Threat Modeling in the Railway Domain
- Author
-
Markus Tauber, David Hofbauer, Arndt Bonitz, Reinhard Hametner, Peter Tummeltshammer, Abdelkader Magdy Shaaban, Michael Meidlinger, Christoph Schmittner, and Manuela Brandstetter
- Subjects
010302 applied physics ,IEC 62443 ,Security analysis ,Cybersecurity ,Computer science ,Railway ,020206 networking & telecommunications ,02 engineering and technology ,Cybersecurity Analysis ,01 natural sciences ,Domain (software engineering) ,Software development process ,Security engineering ,Risk analysis (engineering) ,Order (exchange) ,0103 physical sciences ,Management system ,Threat model ,0202 electrical engineering, electronic engineering, information engineering ,Block (data storage) ,Threat Modeling - Abstract
Connected and intelligent railway technologies like the European Rail Trac Management System (ERTMS) introduce new risks in cybersecurity. Threat modeling is a building block in security engineering that identifies potential threats in order to define corresponding mitigation. In this paper, we show how to conduct threat modeling for railway security analysis during a development life cycle based on IEC 62443. We propose a practical and efficient approach to threat modeling, extending existing tool support and demonstrating its applicability and feasibility.
- Published
- 2019
- Full Text
- View/download PDF
80. Combined Approach for Safety and Security
- Author
-
Peter Puschner, Siddhartha Verma, Thomas Gruber, and Christoph Schmittner
- Subjects
Fault tree analysis ,Computer science ,Process (engineering) ,020209 energy ,Reliability (computer networking) ,Attack tree ,02 engineering and technology ,Risk analysis (engineering) ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,020201 artificial intelligence & image processing ,Isolation (database systems) ,Failure mode and effects analysis ,Vulnerability (computing) - Abstract
With evolution in Cyber-Physical Systems, the dependence and conflicts among dependability attributes (safety, security, reliability, availability etc) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combined risk assessment for safety and security. This approach allows combined risk assessment considering dependence and conflict among attributes. The assessment results for different dependability attributes (such as safety, security etc.) are provided in the ANP matrix. We will discuss approaches such as Fault Tree Analysis (FTA), Stochastic Colored Petri Net (SCPN) Analysis, Attack Tree Analysis (ATA), Failure Mode Vulnerability and Effect Analysis (FMVEA) for evaluation of concerned attributes and achieving our goal of combined assessment.
- Published
- 2019
- Full Text
- View/download PDF
81. RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Security
- Author
-
Georg Macher, Christoph Schmittner, Jürgen Dobaj, and Michael Krisper
- Subjects
021110 strategic, defence & security studies ,Computer science ,Judgement ,0211 other engineering and technologies ,02 engineering and technology ,Attack graph ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,Domain (software engineering) ,Diamond model ,0202 electrical engineering, electronic engineering, information engineering ,Tree based ,Risk assessment ,computer - Abstract
In this paper, the RISKEE method for evaluating risk in cyber security is described. RISKEE is based on attack graphs and the Diamond model combined with the FAIR method for assessing and calculating risk. It can be used to determine the risks of cyber-security attacks as a basis for decision-making. It works by forwarding estimations of attack frequencies and probabilities over an attack graph, calculating the risk at impact nodes with Monte-Carlo simulation, and propagating the resulting risk backward again. The method can be applied throughout all development phases and even be refined at runtime of a system. It involves system analysts, cyber security experts as well as domain experts for judgement of the attack frequencies, system vulnerabilities, and loss magnitudes.
- Published
- 2019
82. Assuring Compliance with Protection Profiles with ThreatGet
- Author
-
Christoph Schmittner, Magdy El Sadany, and Wolfgang Kastner
- Subjects
Security analysis ,Computer science ,business.industry ,02 engineering and technology ,Secure by design ,Compliance (psychology) ,Risk analysis (engineering) ,Protection Profile ,020204 information systems ,Threat model ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Risk management - Abstract
We present ThreatGet a new tool for security analysis, based on threat modeling. The tool is integrated into a model-based engineering platform, supporting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.
- Published
- 2019
- Full Text
- View/download PDF
83. Management of automotive software updates
- Author
-
Teresa Placho, Christoph Schmittner, Oliver Wana, and Arndt Bonitz
- Subjects
Focus (computing) ,Computer Networks and Communications ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Automotive industry ,02 engineering and technology ,020202 computer hardware & architecture ,Domain (software engineering) ,Software ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,business ,Automotive software - Abstract
Software updates are an important topic for increasingly software dependent and automated automotive systems. Besides ongoing technical developments, there are also regulatory requirements in development for such systems. We present here an overview of the automotive domain and the particular requirements on update systems, identify potentially suitable update frameworks and evaluate them based on automotive requirements. A focus is on a holistic view of requirements, considering safety, security, and availability.
- Published
- 2020
84. Connected cars ? Threats, vulnerabilities and their impact
- Author
-
Markus Tauber, Jerker Delsing, David Hofbauer, Christoph Schmittner, Silia Maksuti, and Stefanie Strobl
- Subjects
business.industry ,Computer science ,Sensors ,Interoperability ,Vulnerability ,Automotive industry ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,Mobile handsets ,0202 electrical engineering, electronic engineering, information engineering ,Security ,Electronics ,Safety ,business ,computer ,Automobiles - Abstract
The growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats. Informationstechnologie und Informationsmanagement
- Published
- 2018
85. Monitoring Industry 4.0 applications for security and safety standard compliance
- Author
-
Markus Tauber, Christoph Schmittner, Ani Bicaku, and Jerker Delsing
- Subjects
Standards ,0209 industrial biotechnology ,Monitoring ,Industry 4.0 ,Computer science ,02 engineering and technology ,Guidelines ,Compliance (psychology) ,020901 industrial engineering & automation ,Risk analysis (engineering) ,Security ,0202 electrical engineering, electronic engineering, information engineering ,Measurable Indicator ,Production (economics) ,020201 artificial intelligence & image processing ,State (computer science) ,Electronics ,Safety ,Industries ,Law - Abstract
IEEE International Conference on Industrial Cyber-Physical Systems, St. Petersburg, Russia, 15-18 May 2018 In Industry 4.0 independent entities shall inter-operate to allow flexible and customized production. To assure the parties that individual components are secured to inter-operate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements from which are derived measurable indicator points. Those reflect configurations of systems recommended by security, safety or legally relevant standards and guidelines, which help to demonstrate the state of compliance. We propose in this paper an initial approach to automate such assessment when components are inter-operating with each other by using a monitoring and standard compliance verification framework. This will assure the parties that services or devices within their organizations operate in a secure and standard compliant way, without compromising the underlying infrastructure. Informationstechnologie und Informationsmanagement
- Published
- 2018
86. Integration of Security in the Development Lifecycle of Dependable Automotive CPS
- Author
-
Helmut Martin, Georg Macher, Eugen Brenner, Martin Krammer, Zhendong Ma, Christoph Schmittner, Eric Armengaud, and Christian Kreiner
- Subjects
Development (topology) ,business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,Automotive industry ,020207 software engineering ,02 engineering and technology ,business ,020202 computer hardware & architecture - Abstract
The exciting new features, such as advanced driver assistance systems, fleet management systems, and autonomous driving, drive the need for built-in security solutions and architectural designs to mitigate emerging security threats. Thus, cybersecurity joins reliability and safety as a cornerstone for success in the automotive industry. As vehicle providers gear up for cybersecurity challenges, they can capitalize on experiences from many other domains, but nevertheless must face several unique challenges. Therefore, this article focuses on the enhancement of state-of-the-art development lifecycle for automotive cyber-physical systems toward the integration of security, safety and reliability engineering methods. Especially, four engineering approaches (HARA at concept level, FMEA and FTA at design level and HSI at implementation level) are extended to integrate security considerations into the development lifecycle.
- Published
- 2018
87. Status of the Development of ISO/SAE 21434
- Author
-
Gerhard Griessnig, Christoph Schmittner, and Zhendong Ma
- Subjects
Engineering ,Engineering management ,Development (topology) ,business.industry ,0202 electrical engineering, electronic engineering, information engineering ,Automotive industry ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,02 engineering and technology ,Plan (drawing) ,business ,Nuclear decommissioning - Abstract
With the ongoing trend to incorporate new functionalities and functions based on the connectivity of vehicles, cybersecurity is becoming an important issue in the vehicle development lifecycle. While the first approaches to address this topic were based on research projects or adaptions of existing concepts of other domains, there is now a new ongoing activity to develop ISO/SAE 21434 a cybersecurity engineering standard for road vehicles. This standard addresses the complete lifecycle from development and production via operation and maintenance up to the decommissioning of the vehicles. We give an overview about the ongoing development, discuss potential contents and objectives and summarize time plan and open points.
- Published
- 2018
88. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
- Author
-
Christoph Schmittner, Georgios Mantas, Markus Tauber, Firooz B. Saghezchi, Alireza Esfahani, Silia Maksuti, Ani Bicaku, Jonathan Rodriguez, Joaquim Bastos, and Rainer Matischek
- Subjects
IoT ,Computer Networks and Communications ,Computer science ,Hash function ,Machine-to-machine communications ,02 engineering and technology ,Device to Device Communication ,Computer security ,computer.software_genre ,Public-key cryptography ,Quality of service ,Teknik och teknologier ,0202 electrical engineering, electronic engineering, information engineering ,Session key ,Overhead (computing) ,Annan elektroteknik och elektronik ,Replay attack ,Computer science [C05] [Engineering, computing & technology] ,Authentication ,Other Electrical Engineering, Electronic Engineering, Information Engineering ,business.industry ,Sensors ,020208 electrical & electronic engineering ,Production ,020206 networking & telecommunications ,Mutual authentication ,Sciences informatiques [C05] [Ingénierie, informatique & technologie] ,Computer Science Applications ,computer network security ,cryptographic protocols ,Internet of Things ,machine-to-machine communication ,machine-to-machine communication technology ,IIoT environment ,IIoT domain ,resource-constrained IoT devices ,security issues ,lightweight security mechanisms ,lightweight authentication mechanism ,industrial IoT environment ,M2M protocols ,M2M communications ,Protocols ,Industrial Internet of Things (IIoT) ,lightweight authentication ,machine-to-machine (M2M) communications ,security ,sensors ,TA ,Hardware and Architecture ,Privacy ,Signal Processing ,Key (cryptography) ,Security ,Engineering and Technology ,business ,computer ,Information Systems ,Computer network - Abstract
In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack. Informationstechnologie und Informationsmanagement
- Published
- 2017
89. 6 Engineering of IoT automation systems
- Author
-
Jerker Delsing, Eduardo Arceredillo, Oscar Carlsson, Christoph Schmittner, Andreas Aldrian, Sándor Plósz, Thomas Ruprechter, Markus Tauber, Bilal Ahmad, and Daniel A. Vera
- Subjects
0209 industrial biotechnology ,020901 industrial engineering & automation ,business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Internet of Things ,business ,Automation - Published
- 2017
90. Security and Privacy in the Automotive Domain: A Technical and Social Analysis
- Author
-
Walter Seböck, Christoph Schmittner, Zhendong Ma, Thomas Gruber, and Bettina Pospisil
- Subjects
Information privacy ,Security analysis ,Privacy by Design ,business.industry ,Privacy software ,Automotive industry ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Domain (software engineering) ,0203 mechanical engineering ,Risk analysis (engineering) ,Information and Communications Technology ,0202 electrical engineering, electronic engineering, information engineering ,Scenario analysis ,business ,computer - Abstract
The automotive domain is undergoing a tremendous transformation in the speed and depth of technological development in recent years. Most of the innovations are based on electronics and ICT. As it is the case for most ICT-based systems, there are increasing concerns about security and privacy in the automotive domain. In this paper, we present a technical and social analysis of this issue using a methodological scenario building approach. We believe that current and future solutions must take both technical and social aspect into consideration. Our analysis provides stakeholders with such a view.
- Published
- 2017
91. Combining Safety and Security Analysis for Industrial Collaborative Automation Systems
- Author
-
Christoph Schmittner, Pal Varga, and Sándor Plósz
- Subjects
Control system security ,Engineering ,Security analysis ,021103 operations research ,business.industry ,Interoperability ,0211 other engineering and technologies ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Process automation system ,Automation ,Information sensitivity ,ISA100.11a ,0202 electrical engineering, electronic engineering, information engineering ,business ,Software engineering ,computer - Abstract
In collaborative automation systems, providing both security and safety assessments are getting increasingly important. As IoT systems gain momentum in the industrial domain, experts stress their concerns about security and safety. Improperly or carelessly deployed and configured systems hide security threats, and even raise issues on safety, as their behavior can threaten human life. The cloud based back-ends are getting used for processing sensor data – on the other hand, legacy equipment, which may contain sensitive information, is made interoperable with broader infrastructure. Safety risks can be triggered by attacks on the backend and confidential information is at risks by attacks on legacy equipment.
- Published
- 2017
92. Systematic pattern approach for safety and security co-engineering in the automotive domain
- Author
-
Tiago Amorim, Daniel Schneider, Georg Macher, Zehndong Ma, Christian Kreiner, Christoph Schmittner, Bernhard Winkler, Martin Krammer, and Helmut Martin
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,Automotive industry ,Context (language use) ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,Domain (software engineering) ,020901 industrial engineering & automation ,Workflow ,Security pattern ,Safety engineering ,0202 electrical engineering, electronic engineering, information engineering ,Use case ,ddc:004 ,business ,computer - Abstract
Future automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or bane - it greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cybersecurity becomes important as additional concern because attacks are now much more likely and severe. Unfortunately, there is lack of experience with security concerns in context of safety engineering in general and in automotive safety departments in particular. To remediate this problem, we propose a systematic pattern-based approach that interlinks safety and security patterns and provides guidance with respect to selection and combination of both types of patterns in context of system engineering. The application of a combined safety and security pattern engineering workflow is shown and demonstrated by an automotive use case scenario.
- Published
- 2017
93. Towards trustworthy end-to-end communication in industry 4.0
- Author
-
Georgios Mantas, Markus Tauber, Rainer Matischek, Silke Palkovits-Rauter, Mario Thron, Christoph Schmittner, Jerker Delsing, Ani Bicaku, and Silia Maksuti
- Subjects
Engineering ,Edge device ,Industry 4.0 ,02 engineering and technology ,Software ,End-to-end principle ,Quality of service ,020204 information systems ,Teknik och teknologier ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,Annan elektroteknik och elektronik ,Trustworthy ,Other Electrical Engineering, Electronic Engineering, Information Engineering ,business.industry ,communication ,020208 electrical & electronic engineering ,Industry4.0 ,TA ,Secure messaging ,standards ,Security ,HD28 ,Engineering and Technology ,CPS ,Trusted Platform Module ,Safety ,Software engineering ,business ,Industries ,Law ,Protocols ,Computer network - Abstract
Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system. Informationstechnologie und Informationsmanagement
- Published
- 2017
94. Threat Modeling for Automotive Security Analysis
- Author
-
Christoph Schmittner and Zhendong Ma
- Subjects
Computer science ,business.industry ,Automotive industry ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,11. Sustainability ,Threat model ,0202 electrical engineering, electronic engineering, information engineering ,Automotive security ,020201 artificial intelligence & image processing ,business ,computer - Published
- 2016
95. Using SAE J3061 for Automotive Security Requirement Engineering
- Author
-
Oliver Dillinger, Zhendong Ma, Peter Puschner, Carolina Reyes, and Christoph Schmittner
- Subjects
Electronic control unit ,Engineering ,Requirements engineering ,business.industry ,Process (engineering) ,Automotive industry ,020206 networking & telecommunications ,02 engineering and technology ,Gateway (computer program) ,Manufacturing engineering ,Domain (software engineering) ,Security engineering ,Risk analysis (engineering) ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,020201 artificial intelligence & image processing ,business - Abstract
Modern vehicles are increasingly software intensive and connected. The potential hazards and economic losses due to cyberattacks have become real and eminent in recent years. Consequently, cybersecurity must be adequately addressed among other dependability attributes such as safety and reliability in the automotive domain. J3061, officially published in January 2016 by SAE International, is a much anticipated standard for cybersecurity for the automotive industry. It fills an important gap which is previously deemed irrelevant in the automotive domain. In this paper, we report our activities of applying J3061 to security engineering of an automotive Electronic Control Unit (ECU) as a communication gateway. As an ongoing work, we share our early experience on the concept phase of the process, with a focus on the part of Threat Analysis and Risk Assessment (TARA). Based on our experience, we propose improvements and discuss its link to ISO 26262.
- Published
- 2016
96. Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective
- Author
-
Christoph Schmittner, William G. Temple, Binbin Chen, Douglas L. Jones, William H. Sanders, Zhendong Ma, and Xinshu Dong
- Subjects
railway safety ,Security analysis ,Engineering ,business.industry ,Reliability (computer networking) ,Maintainability ,Cyber-physical system ,Computer security ,computer.software_genre ,cyber-physical systems ,Domain (software engineering) ,Transport engineering ,Security engineering ,urban railway systems ,Order (exchange) ,Information and Communications Technology ,business ,computer ,security analysis - Abstract
Urban railway systems are increasingly relying on information and communications technologies (ICT). This evolution makes cybersecurity an important concern, in addition to the traditional focus on reliability, availability, maintainability and safety. In this paper, we examine two examples of cyberintensive systems in urban railway environments—a communications-based train control system, and a mobile app that provides transit information to commuters—and use them to study the challenges for conducting security analysis in this domain. We show the need for a cyber-physical perspective in order to understand the cross-domain attack/defense and the complicated physical consequence of cyber breaches.We present security analysis results from two different methods that are used in the safety and ICT security engineering domains respectively, and use them as concrete references to discuss the way to move forward.
- Published
- 2015
97. Combined safety and security development lifecylce
- Author
-
Erwin Schoitsch, Christoph Schmittner, and Zhendong Ma
- Subjects
Security engineering ,Engineering ,Cloud computing security ,Security service ,Risk analysis (engineering) ,business.industry ,Systems engineering ,Security management ,System lifecycle ,Computer security model ,business ,Security information and event management ,Security testing - Abstract
The evolution of Cyber-physical Systems and their often critical roles in many application domains such as automotive, aeronautics, energy, and railway make it necessary to address safety and security issues equally throughout the entire system lifecycle. In the past, safety and security development has been mostly performed independently. With increasing complexity and connectivity, this separation is no longer justifiable. This paper proposes a combined safety and security development lifecycle. We review existing standards in order to identify safety and security core activities. Based on the results, a combined lifecycle is introduced that integrates both safety and security considerations and activities in a coordinated way. Finally the feasibility of the approach is demonstrated by case studies.
- Published
- 2015
98. The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles
- Author
-
Christoph Schmittner, Zhendong Ma, Thomas Gruber, and Erwin Schoitsch
- Subjects
Functional safety ,System of systems ,Situation awareness ,Standardization ,Computer science ,business.industry ,Automotive industry ,Computer security ,computer.software_genre ,Critical infrastructure ,Sustainability ,Key (cryptography) ,business ,computer - Abstract
A key long-term trend is towards highly automated vehicles and autonomous driving. This has a huge impact, besides comfort and enabling people not able or allowed to drive, on sustainability of environmental-friendly urban road transport because the number of vehicles and parking space could considerably be reduced if called on command and left behind after use for the next call. This requires a considerable amount of functionality, sensors, actuators and control, situation awareness etc., and the integration into a new type of critical infrastructure based on communication between vehicles and vehicles and infrastructure for regional traffic management. Both, safety and security aspects have to be handled in a coordinated manner, affecting co-engineering, co-certification and standardization.
- Published
- 2015
99. A Case Study of FMVEA and CHASSIS as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems
- Author
-
Zhendong Ma, Thomas Gruber, Erwin Schoitsch, and Christoph Schmittner
- Subjects
Control system security ,Security analysis ,Engineering ,Chassis ,business.industry ,Cyber-physical system ,Computer security ,computer.software_genre ,Security testing ,Security information and event management ,Security engineering ,Information system ,business ,computer - Abstract
The increasing integration of computational components and physical systems creates cyber-physical system, which provide new capabilities and possibilities for humans to control and interact with physical machines. However, the correlation of events in cyberspace and physical world also poses new safety and security challenges. This calls for holistic approaches to safety and security analysis for the identification of safety failures and security threats and a better understanding of their interplay. This paper presents the application of two promising methods, i.e. Failure Mode, Vulnerabilities and Effects Analysis (FMVEA) and Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS), to a case study of safety and security co-analysis of cyber-physical systems in the automotive domain. We present the comparison, discuss their applicabilities, and identify future research needs.
- Published
- 2015
100. Standardization challenges for safety and security of connected, automated and intelligent vehicles
- Author
-
Zhendong Ma, Thomas Gruber, and Christoph Schmittner
- Subjects
Transport engineering ,Engineering ,Standardization ,business.industry ,Vehicle safety ,Systems engineering ,Automotive industry ,Iso standards ,State (computer science) ,Mobile communication systems ,business - Abstract
Connected, automated and intelligent vehicles give rise to new safety and security challenges. These challenges need to be considered in automotive standards. We describe the challenges and analyze the state of the art of related automotive standards. We identify the gaps and propose possible actions.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.