Abstract
Our lives depend on automotive cybersecurity, protecting us inside and near vehicles. Steering and brakes are nowadays usually controlled by computers. If they go rogue, they can operate the vehicle against the driver’s will and potentially drive off a cliff or into a crowd.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
ECU and CPS (Cyber-Physical System) are synonymous here.
- 2.
Single-path attack graphs are also called attack trees and are a subset of multi-path attack graphs.
- 3.
UnBBayes is an open-source framework for probabilistic models. UnBBayes has many academic contributors, was registered in 2002, and is still active in 2021; see https://sourceforge.net/projects/unbbayes/ and Section 5.3.2.1 (Bayesian Network Library) on page 180.
- 4.
n: the number of Software + Communication Medium + Asset nodes
- 5.
m: the number of (anticipated) Exploit objects
- 6.
A mobile CPU from 2011 finished in the benchmark within a few minutes; see details in Section 4.4.3 (Performance Benchmark Method).
- 7.
All methods and implementations have been designed for and tested on development data of an actual mass-produced vehicle. Hence, an NDA became obligatory and prohibits the disclosure of vehicle details, even the make and model.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Fachmedien Wiesbaden GmbH, part of Springer Nature
About this chapter
Cite this chapter
Salfer, M. (2024). Introduction. In: Automotive Security Analyzer for Exploitability Risks. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-43506-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-658-43506-6_1
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-43505-9
Online ISBN: 978-3-658-43506-6
eBook Packages: Computer Science and Engineering (German Language)