Attack graph-based assessment of exploitability risks in automotive on-board networks

Martin Salfer, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

High-end vehicles incorporate about one hundred computers; physical and virtualized ones; self-driving vehicles even more. This allows a plethora of attack combinations. This paper demonstrates how to assess exploitability risks of vehicular on-board networks via automatically generated and analyzed attack graphs. Our stochastic model and algorithm combine all possible attack vectors and consider attacker resources more efficiently than Bayesian networks. We designed and implemented an algorithm that assesses a compilation of real vehicle development documents within only two CPU minutes, using an average of about 100 MB RAM. Our proof of concept “Security Analyzer for Exploitability Risks” (SAlfER) is 200 to 5 000 times faster and 40 to 200 times more memory-efficient than an implementation with UnBBayes1. Our approach aids vehicle development by automatically re-checking the architecture for attack combinations that may have been enabled by mistake and which are not trivial to spot by the human developer. Our approach is intended for and relevant for industrial application. Our research is part of a collaboration with a globally operating automotive manufacturer and is aimed at supporting the security of autonomous, connected, electrified, and shared vehicles.

Original languageEnglish
Title of host publicationARES 2018 - 13th International Conference on Availability, Reliability and Security
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450364485
DOIs
StatePublished - 27 Aug 2018
Event13th International Conference on Availability, Reliability and Security, ARES 2018 - Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018

Publication series

NameACM International Conference Proceeding Series

Conference

Conference13th International Conference on Availability, Reliability and Security, ARES 2018
Country/TerritoryGermany
CityHamburg
Period27/08/1830/08/18

Keywords

  • Attack graph construction
  • Network hardening
  • Probabilistic model
  • Security evaluation
  • Vehicle security
  • Vulnerability assessment

Fingerprint

Dive into the research topics of 'Attack graph-based assessment of exploitability risks in automotive on-board networks'. Together they form a unique fingerprint.

Cite this