Skip to main content

2024 | OriginalPaper | Buchkapitel

3. System Model, Attacker Profile, Exploit Model, Attack Graphs and Exploitability Quantification

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Models chapter introduces the representations of automotive on-board networks, anticipated attackers, anticipated exploits, and attack graphs, as well as a quantification of the attack surface exploitability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Own experiments demonstrated 15 incoming variables to be already too many states \((2^{15}=8\,192)\) in a node for a standard Bayesian UnBBayes inference on commodity office IT (from 2013).
 
2
The Gaussian distribution allows explicitly stating an estimation’s precision. A many-digit number would be misinterpreted by people who derive the accuracy from a number’s number of digits.
 
3
The number of instructions is not necessarily linearly proportional to the code size or even the binary size due to compiler configuration, interpreter activity, available software libraries, and hardware extensions.
 
4
C/C++ is often used, e.g., for time-critical, deterministic behavior. Many safety verification and certification tools and methods exist for C/C++ to avoid typical vulnerabilities.
 
5
A reflash routine can still be well protected by strong cryptographic authentication, which induces a high access effort \(s_{sa}\).
 
8
The strong typing of Java enforces, for example, the Attacker Profile to accept Software nodes as Access nodes and to reject Resource objects. The static typing allows these checks already at compile time.
 
13
Well-chosen internal data structures ensure correct data management. For example, the uniqueness relation of Skills to Resources is implicitly enforced by using Java Maps, a data structure that is right-unique and not left-unique.
 
23
VisualVM: Its project website is https://​visualvm.​github.​io/​ and its source code is at https://​github.​com/​oracle/​visualvm.
 
24
Java was released first as stable in January 1996 and still enjoys ongoing strong development.
 
25
Go was released first as stable in March 2012.
 
26
Rust was released first as stable in May 2015.
 
27
An NDA obligatorily covers the actual vehicle data and its analysis results.
 
29
An IDS consumes many resources during runtime and conflicts with the high sustainability and electric reach requirements.
 
Metadaten
Titel
System Model, Attacker Profile, Exploit Model, Attack Graphs and Exploitability Quantification
verfasst von
Martin Salfer
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-658-43506-6_3

Neuer Inhalt