Skip to main content

Showing 1–16 of 16 results for author: Marksteiner, S

.
  1. A Systematic Approach to Automotive Security

    Authors: Masoud Ebrahimi, Stefan Marksteiner, Dejan Ničković, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, Sandra König

    Abstract: We propose a holistic methodology for designing automotivesystems that consider security a central concern at every design stage.During the concept design, we model the system architecture and definethe security attributes of its components. We perform threat analysis onthe system model to identify structural security issues. From that analysis,we derive attack trees that define recipes describing… ▽ More

    Submitted 17 April, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

    Comments: Presented at Formal Methods 2023 25th International Symposium (FM'23). 12 pages, 5 figures

    Journal ref: In: Chechik, M., Katoen, JP., Leucker, M. (eds) Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000. Springer, Cham

  2. Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing

    Authors: Stefan Marksteiner, Slava Bronfman, Markus Wolf, Eddie Lazebnik

    Abstract: Cybersecurity testing of automotive systems has become a practical necessity, with the wide adoption of advanced driving assistance functions and vehicular communications. These functionalities require the integration of information and communication technologies that not only allow for a plethora of on-the-fly configuration abilities, but also provide a huge surface for attacks. Theses circumstan… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: 6 pages, 3 figures, accepted for the joint SRCNAS/STRIVE workshop at the 6th IEEE European Symposium on Security and Privacy

    Journal ref: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) - Safety vs Security in the Air and on the Ground

  3. A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation

    Authors: Stefan Marksteiner, Peter Priller

    Abstract: Through international regulations (most prominently the latest UNECE regulation) and standards, the already widely perceived higher need for cybersecurity in automotive systems has been recognized and will mandate higher efforts for cybersecurity engineering. T he UNECE also demands the effectiveness of these engineering to be verified and validated through testing. T his requires both a significa… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: 7 pages, 6 figures, accepted for the joint SRCNAS/STRIVE workshop at the 6th IEEE European Symposium on Security and Privacy

    Journal ref: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) - Safety vs Security in the Air and on the Ground

  4. An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case

    Authors: Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf

    Abstract: This paper presents a Domain Specific Language (DSL) for generically describing cyber attacks, agnostic to specific system-under-test(SUT). The creation of the presented DSL is motivated by an automotive use case. The concepts of the DSL are generic such thatattacks on arbitrary systems can be addressed.The ongoing trend to improve the user experience of vehicles with connected services implies an… ▽ More

    Submitted 19 August, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 13 pages, 4 figures, accepted at the 10th International Workshop on Security of Mobile Applications (IWSMA 2021) in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021)

    MSC Class: 68Q45; 68M25; ACM Class: F.4.3; F.3.1; D.2.5; D.4.6

    Journal ref: The 16th International Conference on Availability, Reliability and Security (ARES 2021), August17-20, 2021, Vienna, Austria

  5. Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques

    Authors: Stefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß

    Abstract: The starting point of securing a network is having a concise overview of it. As networks are becoming more and more complex both in general and with the introduction of IoT technology and their topological peculiarities in particular, this is increasingly difficult to achieve. Especially in cyber-physical environments, such as smart factories, gaining a reliable picture of the network can be, due… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Comments: 11 pages, 4 figures, presented at Fourth International Congress on Information and Communication Technology (ICICT 2019), published by Springer

    Journal ref: In: ICICT 2019. Adv. in Intelligent Systems and Computing, vol 1027. Springer (2020)

  6. SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems

    Authors: Christian Wolschke, Behrooz Sangchoolie, Jacob Simon, Stefan Marksteiner, Tobias Braun, Hayk Hamazaryan

    Abstract: Increasing communication and self-driving capabilities for road vehicles lead to threats imposed by attackers. Especially attacks leading to safety violations have to be identified to address them by appropriate measures. The impact of an attack depends on the threat exploited, potential countermeasures and the traffic situation. In order to identify such attacks and to use them for testing, we pr… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: 8 pages, 2 figures Presented at the 7th International Workshop on Safety and Security of Intelligent Vehicles (SSIV+ 2021, held in conjunction with DSN2021)

    Journal ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)

  7. A Process to Facilitate Automated Automotive Cybersecurity Testing

    Authors: Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev

    Abstract: Modern vehicles become increasingly digitalized with advanced information technology-based solutions like advanced driving assistance systems and vehicle-to-x communications. These systems are complex and interconnected. Rising complexity and increasing outside exposure has created a steadily rising demand for more cyber-secure systems. Thus, also standardization bodies and regulators issued stand… ▽ More

    Submitted 25 June, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures paper presented at IEEE VTC2021-Spring. Full published version at https://ieeexplore.ieee.org/document/9448913

    Journal ref: IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-7

  8. Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing

    Authors: Stefan Marksteiner, Rudolf Ramler, Hannes Sochor

    Abstract: Industrial Internet of Things (IIoT) application provide a whole new set of possibilities to drive efficiency of industrial production forward. However, with the higher degree of integration among systems, comes a plethora of newthreats to the latter, as they are not yet designed to be broadly reachable and interoperable. To mitigate these vast amount of new threats, systematic and automated test… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Comments: 3 pages, 1 figure, Central European Cybersecurity Conference 2019 (CECC2019), Munich

    ACM Class: D.2.4; D.2.5

  9. Approaching the Automation of Cyber Security Testing of Connected Vehicles

    Authors: Stefan Marksteiner, Zhendong Ma

    Abstract: The advancing digitalization of vehicles and automotive systems bears many advantages for creating and enhancing comfort and safety-related systems ranging from drive-by-wire, inclusion of advanced displays, entertainment systems up to sophisticated driving assistance and autonomous driving. It, however, also contains the inherent risk of being used for purposes that are not intended for, raging f… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Comments: 3 pages, 1 figure, Central European Cybersecurity Conference 2019 (CECC2019), Munich

  10. Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing

    Authors: Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant

    Abstract: The factories of the future require efficient interconnection of their physical machines into the cyber space to cope with the emerging need of an increased uptime of machines, higher performance rates, an improved level of productivity and a collective collaboration along the supply chain. With the rapid growth of the Internet of Things (IoT), and its application in industrial areas, the so calle… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Comments: 8 pages, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26-29, 2019, Canterbury, United Kingdom

  11. Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

    Authors: Stefan Marksteiner

    Abstract: In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution. To assure their authenticity, however, they have to be cryptographically protected and equipped with an environment for successful validation, combining p… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

    Comments: 4 pages, 2 figures

    Journal ref: Proceedings of the 2018 IEEE 20th Conference on Business Informatics (CBI)

  12. Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective

    Authors: Stefan Marksteiner

    Abstract: Smart Services using Industrial Internet of Things (IIoT) applications are on the rise, but still more often than not, traditional industrial protocols are used to interconnect the entities of the resulting systems. These protocols are mostly not intended for functioning in such a highly interconnected environment and, therefore, often lack even the most fundamental security measures. To address t… ▽ More

    Submitted 24 September, 2018; v1 submitted 3 September, 2018; originally announced September 2018.

    Comments: 4 pages, 1 figure, This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 773715, Proceedings of the 2018 IEEE 20th Conference on Business Informatics (CBI)

  13. An Overview of Wireless IoT Protocol Security in the Smart Home Domain

    Authors: Stefan Marksteiner, Víctor Juan Expósito Jiménez, Heribert Vallant, Herwig Zeiner

    Abstract: While the application of IoT in smart technologies becomes more and more proliferated, the pandemonium of its protocols becomes increasingly confusing. More seriously, severe security deficiencies of these protocols become evident, as time-to- market is a key factor, which satisfaction comes at the price of a less thorough security design and testing. This applies especially to the smart home doma… ▽ More

    Submitted 22 January, 2018; originally announced January 2018.

    Comments: 8 pages, 4 figures

    Journal ref: Proceedings of the Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks, 2017

  14. arXiv:1801.01710  [pdf, other

    cs.CR

    On the Resilience of a QKD Key Synchronization Protocol for IPsec

    Authors: Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart

    Abstract: This paper presents a practical solution to the problem of limited bandwidth in Quantum Key Distribution (QKD)- secured communication through using rapidly rekeyed Internet Protocol security (IPsec) links. QKD is a cutting-edge security technology that provides mathematically proven security by using quantum physical effects and information theoretical axioms to generate a guaranteed non-disclosed… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.

    Journal ref: International Journal on Advances in Security, vol 9 no 3 & 4, year 2016

  15. Towards a Secure Smart Grid Storage Communications Gateway

    Authors: Stefan Marksteiner, Heribert Vallant

    Abstract: This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid. To do so, it defines security requirements for a communications gateway and gives detailed information and hands-on configuration advice on node and communication line security, data storage, co** with backend M2M communications pr… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 6 pages, 2 figures

    Journal ref: Proceedings of the 2017 Smart City Symposium Prague (2017)

  16. An Iterative and Toolchain-Based Approach to Automate Scanning and Map** Computer Networks

    Authors: Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf

    Abstract: As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by map** it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasing… ▽ More

    Submitted 3 October, 2017; originally announced October 2017.

    Comments: 7 pages, 6 figures

    ACM Class: C.2.3; C.2.0; K.6.5

    Journal ref: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense (2016) 37-43