CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems

Author:

Mohamad Mazen1ORCID,Jolak Rodi1ORCID,Askerdal Örjan2ORCID,Steghöfer Jan-Philipp1ORCID,Scandariato Riccardo3ORCID

Affiliation:

1. Chalmers and University of Gothenburg, Chalmersplatsen, Gothenburg, Sweden

2. Volvo Trucks, Gothenburg, Sweden

3. Hamburg University of Technology, Hamburg, Germany

Abstract

Security Assurance Cases (SAC) are structured arguments and evidence bodies used to reason about the security of a certain system. SACs are gaining focus in the automotive industry, as the needs for security assurance are growing in this domain. However, the state-of-the-arts lack a mature approach able to suit the needs of the automotive industry. In this article, we present CASCADE, an asset-driven approach for creating SAC, which is inspired by the upcoming security standard ISO/SAE-21434 as well as the internal needs of automotive Original Equipment Manufacturers (OEMs). CASCADE also differentiates itself from the state-of-the-art by incorporating a way to reason about the quality of the constructed security assurance case. We created the approach by conducting an iterative design science research study. We illustrate the results using the example case of the road vehicle’s headlamp provided in the ISO standard. We also illustrate how our approach aligns well with the structure and content of the ISO/SAE-21434 standard, hence demonstrating the practical applicability of CASCADE in an industrial context.

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference28 articles.

1. Adelard. 2022. Claims Arguments and Evidence (CAE) . https://www.adelard.com/asce/cae/. Accessed July 12 2022.

2. The MITRE Corporation (MITRE). 2022. Common Attack Pattern Enumeration and Classification (CAPEC) . http://capec.mitre.org/. Accessed July 2 2022.

3. Sebastian Herold Holger Klus Yannick Welsch Constanze Deiters Andreas Rausch Ralf Reussner Klaus Krogmann Heiko Koziolek Raffaela Mirandola Benjamin Hummel et al. 2008. CoCoME-the common component modeling example. In Proceeding of the Common Component Modeling Example Springer 16–53.

4. A. Finnegan and F. McCaffery. 2014. Towards an international security case framework for networked medical devices. In International Conference on Computer Safety, Reliability, and Security. Springer, 197–209.

5. Rob Alexander Richard Hawkins and Tim Kelly. 2011. Security assurance cases: Motivation and the state of the art. High Integrity Systems Engineering Department of Computer Science University of York Deramore Lane York YO10 5GH . https://www-users.cs.york.ac.uk/rhawkins/papers/York%20CESG%20security%20case%20report.pdf.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Increasing the Confidence in Security Assurance Cases using Game Theory;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

2. Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W);2024-06-24

3. Tracking assets in source code with Security Annotations;Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings;2024-04-14

4. A Requirements Optimization Method for Automotive Cyber Security Assurance;Lecture Notes in Computer Science;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3