US\(^2\): An Unified Safety and Security Analysis Method for Autonomous Vehicles

  • Jin Cui
  • Giedre Sabaliauskaite
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 886)


Autonomous Vehicles (AVs) are security-critical systems, and safety is primary goal for AVs. The high degree of integration between safety and security introduces new problem: how to systematically analyse safety and security? In this paper, we propose an Unified Safety and Security analysis method (US\(^2\)), which uses a simple quantification scheme to assess safety hazards and security threats simultaneously. US\(^2\) is a useful tool for safety and security requirements specification and selection of countermeasures. Example of US\(^2\) application is included to highlight the strengths of the proposed method.


Autonomous vehicles Safety Security ISO 26262 SAE J3016 SAE J3061 


  1. 1.
    Society of Automotive Engineers (SAE): SAE-J3016: Taxonomy and Definitions for terms Related to Driving Automation Systems for On-Road Motor Vehicles, September 2016Google Scholar
  2. 2.
    The Associated Press: Worlds 1st self-driving taxi debut in Singapore. Accessed 12 October 2017
  3. 3.
    Cui, J., Sabaliauskaite, G.: On the alignment of safety and security for autonomous vehicles. In: IARIA CYBER, Barcelona, Spain, November 2017Google Scholar
  4. 4.
    International Organization for Standardization (ISO): ISO-26262: Road Vehicles - Functional safety, December 2016Google Scholar
  5. 5.
    Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: Sahara: a security-aware hazard and risk analysis method. In: IEEE DATE, Grenoble, France (2015)Google Scholar
  6. 6.
    Corporation, M.: The stride threat model (2005)Google Scholar
  7. 7.
    Society of Automotive Engineers (SAE): SAE-J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, January 2016Google Scholar
  8. 8.
    Ward, D., Ibarra, I., Ruddle, A.: Threat analysis and risk assessment in automotive cyber security. SAE Int. J. Passeng. Cars Electron. Electr. Syst. 6(01–1415), 507–513 (2013)CrossRefGoogle Scholar
  9. 9.
    EVITA - E-safety vehicle intrusion protected applications, “Evita project,”. Accessed 12 Oct 2017
  10. 10.
    Islam, M., et al.: Deliverable D2 Security models. HEAVENS Project, Deliverable D2, Release 1 December 2014Google Scholar
  11. 11.
    Macher, G., Armengaud, E., Brenner, E., Kreiner, C.: A review of threat analysis and risk assessment methods in the automotive context. Springer International Publishing, Trondheim (2016)Google Scholar
  12. 12.
    NHTSA: Federal automated vehicles policy, September 2016Google Scholar
  13. 13.
    Paul, A., Chauhan, R., Srivastava, R., Baruah, M.: Advanced driver assistance systems. Technical report. SAE Technical Paper (2016)Google Scholar
  14. 14.
    Becker, J., Helmle, M., Pink, O.: System architecture and safety requirements for automated driving. In: Automated Driving, pp. 265–283. Springer (2017)Google Scholar
  15. 15.
    Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaâniche, M., Laarouchi, Y.: Survey on security threats and protection mechanisms in embedded automotive networks. In: IEEE DSN-W, Budapest, Hungary (2013)Google Scholar
  16. 16.
    Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)Google Scholar
  17. 17.
    Yan, W.: A two-year survey on security challenges in automotive threat landscape. In: IEEE ICCVE, ShenZhen, China (2015)Google Scholar
  18. 18.
    Thing, V.L., Wu, J.: Autonomous vehicle security: a taxonomy of attacks and defences. In: IEEE CPSCom, ChengDu, China (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Centre for Research in Cyber Security (iTrust)Singapore University of Technology and Design, SUTDSingaporeSingapore

Personalised recommendations