Skip to main content

Abstract

Our lives depend on automotive cybersecurity, protecting us inside and near vehicles. Steering and brakes are nowadays usually controlled by computers. If they go rogue, they can operate the vehicle against the driver’s will and potentially drive off a cliff or into a crowd.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ECU and CPS (Cyber-Physical System) are synonymous here.

  2. 2.

    Single-path attack graphs are also called attack trees and are a subset of multi-path attack graphs.

  3. 3.

    UnBBayes is an open-source framework for probabilistic models. UnBBayes has many academic contributors, was registered in 2002, and is still active in 2021; see https://sourceforge.net/projects/unbbayes/ and Section 5.3.2.1 (Bayesian Network Library) on page 180.

  4. 4.

    n: the number of Software + Communication Medium + Asset nodes

  5. 5.

    m: the number of (anticipated) Exploit objects

  6. 6.

    A mobile CPU from 2011 finished in the benchmark within a few minutes; see details in Section 4.4.3 (Performance Benchmark Method).

  7. 7.

    All methods and implementations have been designed for and tested on development data of an actual mass-produced vehicle. Hence, an NDA became obligatory and prohibits the disclosure of vehicle details, even the make and model.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Salfer .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Fachmedien Wiesbaden GmbH, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Salfer, M. (2024). Introduction. In: Automotive Security Analyzer for Exploitability Risks. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-43506-6_1

Download citation

Publish with us

Policies and ethics