A Combined Safety-Hazards and Security-Threat Analysis Method for Automotive Systems

Safety and Security appear to be two contradicting overall system features. Traditionally, these two features have been treated separately, but due to increasing awareness of mutual impacts, cross domain knowledge becomes more important. Due to the increasing interlacing of automotive systems with networks (such as Car2X), it is no longer acceptable to assume that safety-critical systems are immune to security risks and vice versa.

[1]  Lorenzo Strigini,et al.  Diversity for Safety and Security in Embedded Systems , 2014 .

[2]  Peter Liggesmeyer,et al.  Modeling and Analysis of Safety-Critical Cyber Physical Systems using State/Event Fault Trees , 2013, DECS@SAFECOMP.

[3]  Cristina Petronela Simion,et al.  CRITICAL INFRASTRUCTURES PROTECTION THROUGH THREAT ANALYSIS FRAMEWORK , 2013 .

[4]  Christoph Schmittner,et al.  Security Application of Failure Mode and Effect Analysis (FMEA) , 2014, SAFECOMP.

[5]  Andreas L. Opdahl,et al.  Enhancing CHASSIS: A Method for Combining Safety and Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[6]  Alastair R. Ruddle,et al.  Threat Analysis and Risk Assessment in Automotive Cyber Security , 2013 .

[7]  Peter Liggesmeyer,et al.  Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System , 2013, DECS@SAFECOMP.

[8]  Robert J. Stroud,et al.  Security-Informed Safety: If It's Not Secure, It's Not Safe , 2013, SERENE.

[9]  Eric Armengaud,et al.  SAHARA: A security-aware hazard and risk analysis method , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[10]  Lorenzo Strigini,et al.  Evidence-Based Security in Aerospace: From Safety to Security and Back Again , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.

[11]  Capers Jones,et al.  Embedded Software: Facts, Figures, and Future , 2009, Computer.

[12]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[13]  Anne Marsden,et al.  International Organization for Standardization , 2014 .

[14]  Karsten Schmidt,et al.  Adapted Development Process for Security in Networked Automotive Systems , 2014 .