Skip to main content

Showing 1–4 of 4 results for author: Schmittner, C

.
  1. A Systematic Approach to Automotive Security

    Authors: Masoud Ebrahimi, Stefan Marksteiner, Dejan Ničković, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, Sandra König

    Abstract: We propose a holistic methodology for designing automotivesystems that consider security a central concern at every design stage.During the concept design, we model the system architecture and definethe security attributes of its components. We perform threat analysis onthe system model to identify structural security issues. From that analysis,we derive attack trees that define recipes describing… ▽ More

    Submitted 17 April, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

    Comments: Presented at Formal Methods 2023 25th International Symposium (FM'23). 12 pages, 5 figures

    Journal ref: In: Chechik, M., Katoen, JP., Leucker, M. (eds) Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000. Springer, Cham

  2. Identification and Verification of Attack-Tree Threat Models in Connected Vehicles

    Authors: Masoud Ebrahimi, Christoph Striessnig, Joaquim Castella Triginer, Christoph Schmittner

    Abstract: As a result of the ever-increasing application of cyber-physical components in the automotive industry, cybersecurity has become an urgent topic. Adapting technologies and communication protocols like Ethernet and WiFi in connected vehicles yields many attack scenarios. Consequently, ISO/SAE 21434 and UN R155 (2021) define a standard and regulatory framework for automotive cybersecurity. Both docu… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

    Comments: SAE 2022 Intelligent and Connected Vehicles Symposium

  3. arXiv:2210.03207  [pdf, other

    cs.CR cs.FL cs.LO

    Threat Repair with Optimization Modulo Theories

    Authors: Thorsten Tarrach, Masoud Ebrahimi, Sandra König, Christoph Schmittner, Roderick Bloem, Dejan Nickovic

    Abstract: We propose a model-based procedure for automatically preventing security threats using formal models. We encode system models and potential threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat prevention as an optimization problem over the same formulas. The outcome of our threat prevention procedure i… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  4. arXiv:1907.00967  [pdf

    cs.OH

    Autonomous CPS mobility securely designed

    Authors: David Hofbauer, Christoph Schmittner, Manuela Brandstetter, Markus Tauber

    Abstract: In the last years the interconnection and ongoing development of physical systems combined with cyber resources has led to increasing automation. Through this progress in technology, autonomous vehicles, especially autonomous trains are getting more attention from industry and are already under test. The use of autonomous trains is known for increasing operation efficiency and reduction of personn… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: The 5th IEEE International workshop on Communication, Computing, and Networking in Cyber Physical Systems (CCNCPS 2019) in association with 20th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2019) - Washington D.C., USA;