This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Threat Identification and Defense Control Selection for Embedded Systems

Journal Article
11-03-02-0005
ISSN: 2572-1046, e-ISSN: 2572-1054
Published August 18, 2020 by SAE International in United States
Threat Identification and Defense Control Selection for Embedded Systems
Citation: Moitra, A., Prince, D., Siu, K., Durling, M. et al., "Threat Identification and Defense Control Selection for Embedded Systems," SAE Int. J. Transp. Cyber. & Privacy 3(2):81-96, 2020, https://doi.org/10.4271/11-03-02-0005.
Language: English

References

  1. Brecht , D. 2016 https://resources.infosecinstitute.com/pros-and-cons-in-penetration-testing-services-the-debate-continues/#gref
  2. 2020 https://github.com/ge-high-assurance/VERDICT
  3. MITRE https://capec.mitre.org/ 2020
  4. National Institute of Standards and Technology 2013
  5. International Organization for Standardization/International Electrotechnical Commission 2018
  6. Shostack , A. Threat Modeling: Designing for Security Indianapolis, IN John Wiley & Sons, Inc. 2014
  7. https://owasp.org/www-community/attacks/ 2020
  8. Koopman , P. Embedded System Security Computer 37 7 95 97 2004
  9. Jang-Jaccard , J. and Nepal , S. A Survey of Emerging Threats in Cybersecurity Journal of Computer and System Sciences 80 5 973 993 2014
  10. Papp , D. , Ma , Z. , and Buttyan , L. Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy 13th Annual Conference on Privacy, Security and Trust (PST) Izmir, Turkey 2015
  11. MITRE Corporation https://cve.mitre.org/ 2020
  12. Xu , G. , Cao , Y. , Ren , Y. , Li , X. et al. Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things IEEE Access 5 21046 21056 2017
  13. Hooper , M. , Tian , Y. , Zhou , R. , Cao , B. et al. Securing Commercial WiFi-Based UAVs from Common Security Attacks MILCOM IEEE Military Communications Conference Baltimore, MD 2016
  14. Whalen , M.W. , Cofer , D. , and Gacek , A. Requirements and Architectures for Secure Vehicles IEEE Software 33 4 22 25 2016
  15. http://cwe.mitre.org
  16. Crapo , A. and Moitra , A. Toward a Unified English-Like Representation of Semantic Models, Data, and Graph Patterns for Subject Matter Experts International Journal of Semantic Computing 7 3 215 236 2013
  17. http://sadl.sourceforge.net/ https://github.com/crapo/sadlos2 2019
  18. https://www.w3.org/OWL/ 2019
  19. Kim , Y.R. , Daly , J. , Kim , C. , Fallin , J. et al. Flipping Bits in Memory without Accessing Them: An Experimental Study of DRAM Disturbance Errors Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture (ISCA) Minneapolis, MN 2014
  20. Siu , K. , Moitra , A. , Li , M. , Durling , M. et al. Architectural and Behavioral Analysis for Cyber Security 38th Digital Avionics Systems Conference San Diego, CA 2019
  21. Siu , K. , Herencia-Zapana , H. , Prince , D. , and Moitra , A. A Model-Based Framework for Analyzing the Security of System Architectures Reliability and Maintainability Symposium (RAMS) Palm Springs, CA 2020
  22. Feiler , P.H. , Gluch , D.P. , and Hudak , J.J. 2006
  23. https://osate.org 2019

Cited By