As a result of the ever-increasing application of cyber-physical components in the automotive industry, cybersecurity has become an urgent topic. Adapting technologies and communication protocols like Ethernet and WiFi in connected vehicles yields many attack scenarios. Consequently, ISO/SAE 21434 and UN R155 (2021) define a standard and regulatory framework for automotive cybersecurity. Both documents follow a risk management-based approach and require a threat modeling methodology for risk analysis and identification. Such a threat modeling methodology must conform to the Threat Analysis and Risk Assessment (TARA) framework of ISO/SAE 21434. Conversely, existing threat modeling methods enumerate isolated threats disregarding the vehicle's design and connections. Consequently, they neglect the role of attack paths from a vehicle's interfaces to its assets. In other words, they are missing the TARA work products, e.g., attack paths compromising assets or feasibility and impact ratings. We propose a threat modeling methodology to construct attack paths by identifying, sequencing, and connecting vulnerabilities from a valid attack surface to an asset. Initially, we transform cybersecurity guidelines to attack trees, and then we use their formal interpretations to assess the vehicle's design. This workflow yields compositional construction of attack paths along with the required TARA work products (e.g., attack paths, feasibility, and impact). More importantly, we can apply the workflow iteratively in the context of connected vehicles to ensure design conformity, privacy, and cybersecurity. Finally, to show the complexity and the importance of preemptive threat identification and risk analysis in the automotive industry, we evaluate the presented model-based approach in a connected vehicle testing platform, SPIDER.
翻译:由于汽车业越来越多地应用网络物理组件,网络安全已成为一个紧迫的议题。在相关车辆中调整以太网和WiFi等技术和通信协议会产生许多攻击情景。因此,ISO/SAE 21434和UN R155(2021)为汽车网络安全确定了标准和监管框架。这两份文件都采用了风险管理方法,需要一种威胁模型方法来进行风险分析和识别。这种威胁模型方法必须符合ISO/SAE/21434的威胁分析和风险评估框架。相反,现有的威胁模型方法罗列了孤立的威胁,而无视车辆的设计和连接。因此,它们忽视了从车辆的界面到其资产的攻击路径的作用。换句话说,它们忽略了汽车网络安全的标准和监管框架。它们忽略了TARA的工作产品,例如攻击路径会损害资产或者可行性和影响评级。我们提出了一种威胁模型方法,通过识别、测序、将基于有效攻击的地面方法的弱点与资产联系起来。我们先是将网络安全准则转换成攻击树木,然后我们用正式的解释来评估其攻击路径及其资产的关联性。这需要从车辆的网络风险路径上来评估攻击路径的设计、 。