This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Integrated Safety and Security Development in the Automotive Domain
Technical Paper
2017-01-1661
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
The replacement of safety-critical mechanical components with electro-mechanical systems has led to the fact that safety aspects play a central role in development of embedded automotive systems. Recently, consumer demands for connectivity (e.g., infotainment, car-2-car or car-2-infrastructure communication) as well as new advances toward advanced driver assistance systems (ADAS) or even autonomous driving functions make cybersecurity another key factor to be taken into account by vehicle suppliers and manufacturers. Although these can capitalize on experiences from many other domains, they still have to face several unique challenges when gearing up for specific cybersecurity challenges.
A key challenge is related to the increasing interconnection of automotive systems with networks (such as Car2X). Due to this connectivity, it is no longer acceptable to assume that safety-critical systems are immune to security risks. Consequently novel automotive systems require appropriate systematic approaches to support security and safety aware development. Traditionally, safety and security have been treated separately, however due to increasing awareness of the mutual impacts, an integrated view based on cross domain knowledge becomes more important.
The recently released SAE J3061 guidebook for cyber-physical vehicle systems provides high-level principles for automotive organizations for identifying and assessing cybersecurity threats and for designing cybersecurity aware systems in close relation to the ISO 26262 standard for the functional safety of road vehicles.
The focus of this paper is set on addressing system safety and cybersecurity in combination rather than independently, and thereby raise the awareness of their mutual impacts. Therefore, we examine appropriate threat modeling and hazard analysis techniques in order to quantify the security impact on dependable safety related system development on a system level. Furthermore, we investigate systematic approaches to supporting the identification of trust boundaries and attack vectors for the safety- and cybersecurity-related aspects of complex automotive systems.
Recommended Content
Technical Paper | Safe and Secure Development: Challenges and Opportunities |
Technical Paper | The Study of Secure CAN Communication for Automotive Applications |
Technical Paper | Hardware/Software Co-Design of an Automotive Embedded Firewall |
Authors
Citation
Macher, G., Messnarz, R., Armengaud, E., Riel, A. et al., "Integrated Safety and Security Development in the Automotive Domain," SAE Technical Paper 2017-01-1661, 2017, https://doi.org/10.4271/2017-01-1661.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 | ||
Unnamed Dataset 4 | ||
Unnamed Dataset 5 |
Also In
References
- Scuro G. Automotive industry: Innovation driven by electronics http://embedded-computing.com/articles/automotive-industry-innovation-driven-electronics/ 2012
- SAE International Surface Vehicle Recommended Practice Cybersecurity Guidebook for Cyber-Physical Vehicle Systems SAE Standard J3061 Jan. 2016
- ISO - International Organization for Standardization ISO 26262 Road vehicles Functional Safety Part 1–10 2011
- ISO - International Organization for Standardization IEC 61508 Functional safety of electrical/ electronic / programmable electronic safety-related systems
- ISO - International Organization for Standardization IEC 60812 Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA) 2006
- ISO - International Organization for Standardization IEC 61025 Fault tree analysis (FTA) December 2006
- ISO – International Organization for Standardization ISO CD 26262-2017 2 nd Edition Road vehicles Functional Safety
- Special Committee 205 of RTCA DO-178C Software Considerations in Airborne Systems and Equipment Certification 2011
- SAE International ARP 4754 Guidelines for Development of Civil Aircraft and Systems 2010
- The Common Criteria Recognition Agreement Members Common Criteria for Information Technology Security Evaluation http://www.commoncriteriaportal.org/ 2014
- European Organization for Civil Aviation Equipment (EUROCAE WG-72) and Radio Technical Commission for Aeronautics (RTCA SC-216) Airworthiness security process specification, ED-202 2010
- Gashi I. , Povyakalo A. , Strigini L. , Matschnig M. , Hinterstoisser T. , and Fischer B. Diversity for Safety and Security in Embedded Systems In International Conference on Dependable Systems and Networks 26 2014
- Schmidt , K. , Tröger , P. , Kroll , H. , Bünger , T. Adapted Development Process for Security in Networked Automotive Systems SAE Int. J. Passeng. Cars – Electron. Electr. Syst. 7 2 516 526 2014 10.4271/2014-01-0334
- Ward , D. , Ibarra , I. , and Ruddle , A. Threat Analysis and Risk Assessment in Automotive Cyber Security SAE Int. J. Passeng. Cars – Electron. Electr. Syst. 6 2 507 513 2013 10.4271/2013-01-1415
- Roth M. and Liggesmeyer P. Modeling and Analysis of Safety-Critical Cyber Physical Systems using State/Event Fault Trees SAFECOMP 2013 – Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security 2013
- Steiner M. and Liggesmeyer P. Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security 2013
- Schmittner C. , Gruber T. , Puschner P. , and Schoitsch E. Security Application of Failure Mode and Effect Analysis (FMEA) Bondavalli A. and Giandomenico F. Di Computer Safety, Reliability, and Security, volume 8666 of Lecture Notes in Computer Science 310 325 Springer International Publishing 2014
- Bloomfield , R. ; Netkachova , K. & Stroud , R. Gorbenko , A. ; Romanovsky , A. & Kharchenko , V. Security-Informed Safety: If It’s Not Secure, It’s Not Safe Software Engineering for Resilient Systems Springer Berlin Heidelberg 2013
- Macher G. , Sporer H. , Berlach R. , Armengaud E. , and Kreiner C. SAHARA: A security-aware hazard and risk analysis method Design, Automation Test in Europe Conference Exhibition (DATE) 2015 621 624 March 2015
- Microsoft Corporation The STRIDE threat model 2005
- Macher , G. , Armengaud E. , Brenner E. & Kreiner , C. A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Proceedings Springer International Publishing 2016
- Avizienis A. , Laprie J.-C. , and Randell B. Dependability and its Threats – A Taxonomy Jacquart R. IFIP Congress Topical Sessions 91 120 2004
- Macher , G. ; Hoeller , A. ; Sporer , H. ; Armengaud , E. & Kreiner , C. Koornneef , F. & van Gulijk , C. (Eds.) A Comprehensive Safety, Security, and Serviceability Assessment Method Computer Safety, Reliability, and Security - 34th International Conference, SAFECOMP 2015, Proceedings Springer International Publishing 2015
- http://soqrates.eurospi.net/
- Macher , G. ; Riel , A. & Kreiner , C. Integrating HARA and TARA - How does this fit with Assumptions of the SAE J3061 Software Quality Professional 2016
- Messnarz , R. ; Kreiner , C. & Riel , A. Integrating Automotive SPICE, Functional Safety, and Cybersecurity Concepts: A Cybersecurity Layer Model Software Quality Professional 2016
- Automotive Information Sharing and Analysis Center AUTO-ISAC Automotive Cybersecurity Best Practices Executive Summary 2016
- Brown D. , Cooper G. , Gilvarry I. , Rajan A. , Tatourian A. , Venugopalan R. , Wheeler D. , and Zhao M. , Automotive Security Best Practices White Paper 2015
- Hahn , T. ; Matthews , S. ; Wood , L. ; Cohn , J. ; Regev , S. ; Fletcher , J. ; Libow , E. ; Poulin , C. & Ohnishi , K. IBM Point of View: Internet of Things Security 2015
- Windriver Improving Android Security for Automotive with a Defense-In-Depth Strategy White Paper 2013
- Pallierer , R. & Ziehensack , M. Secure Ethernet Communication for Autonomous Driving 2016
- Macher , G. ; Sporer , H. ; Brenner , E. & Kreiner , C. Supporting Cyber-security based on Hardware-Software Interface Definition Systems Software and Services Process Improvement - 23nd European Conference, EuroSPI 2016 Proceedings Springer 2016
- Böhner M. Extending software architectures from safety to security Proceedings of the Automotive Safety & Security Conference 2015
- Otsuka , S. , Ishigooka , T. , Oishi , Y. , and Sasazawa , K. CAN Security: Cost-Effective Intrusion Detection for Real-Time Control Systems SAE Technical Paper 2014-01-0340 2014 10.4271/2014-01-0340