Towards a security-driven automotive development lifecycle

被引:10
|
作者
Dobaj, Juergen [1 ,2 ]
Macher, Georg [1 ,2 ]
Ekert, Damjan [2 ]
Riel, Andreas [2 ,3 ]
Messnarz, Richard [2 ]
机构
[1] Graz Univ Technol, Inst Tech Informat, Graz, Austria
[2] ISCN GesmbH, Dev Dept, Graz, Austria
[3] Grenoble Alps Univ, CNRS, G SCOP, Grenoble INP, Grenoble, France
基金
欧盟地平线“2020”;
关键词
automotive SPICE; cybersecurity; development lifecycle model; ISO; SAE; 21434; risk assessment; threat modeling; RISK-ASSESSMENT; SYSTEMS; THREAT; SAFETY;
D O I
10.1002/smr.2407
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybersecurity has become one of the most crucial challenges in the automotive development lifecycle. The upcoming ISO/SAE 21434 standard provides only a generic framework that is insufficient to derive concrete design methods. This article proposes an actionable cybersecurity development lifecycle model that provides concrete action and work product guidance aligned with the ISO/SAE 21434 and Automotive SPICE (R) extension for cybersecurity. The model has been inspired by action research in "next" industry practice pilot projects, which ensures that it is actionable. It has been augmented by insights gained from literature research in cybersecurity development for embedded systems. The proposed lifecycle model complements the ISO/SAE 21434 standard and provides the basis for the company-specific process and practice specifications. It has been validated through the integration of cybersecurity-related aspects in an electric power steering system. A core characteristic of the model is the central role of threat modeling, vulnerability analyses, and cybersecurity requirements derivation on both system and subsystem levels. Without concrete practice guidelines, the ISO/SAE 21434 is very difficult to understand and apply at this stage. This contribution aims to fill this gap through a model inspired by cutting-edge embedded cybersecurity practices interpreted for the current and near-future automotive electronic architectures.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Automotive security demands an infinite software development lifecycle
    [J]. Pitchford, Mark, 2018, Hearst Business Communications (60):
  • [2] Security-driven exploration of cryptography in DSP cores
    Gebotys, CH
    [J]. ISSS'02: 15TH INTERNATIONAL SYMPOSIUM ON SYSTEM SYNTHESIS, 2002, : 80 - 85
  • [3] Semantic Security: Specification and Enforcement of Semantic Policies for Security-driven Collaborations
    Sinnott, R. O.
    Doherty, T.
    Gray, N.
    Lusted, J.
    [J]. HEALTHGRID RESEARCH, INNOVATION AND BUSINESS CASE, 2009, 147 : 201 - +
  • [4] Security-driven prioritization for tactical mobile networks
    Suomalainen, Jani
    Julku, Jukka
    Heikkinen, Antti
    Rantala, Seppo J.
    Yastrebova, Anastasia
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [5] Cloud services security-driven evaluation for multiple tenants
    Maroc, Sarah
    Zhang, Jian Biao
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1103 - 1121
  • [6] Towards Evaluation of Security Assurance during the Software Development Lifecycle
    Uusitalo, Ilkka
    Karppinen, Kaarina
    Ahonen, Pasi
    Pentikainen, Heimo
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 817 - 822
  • [7] Safety and security-driven design of networked embedded systems
    Sveda, Miroslav
    Trchalik, Roman
    [J]. DSD 2007: 10TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, 2007, : 420 - 423
  • [8] Security-driven scheduling algorithms based on Eigentrust in Grid
    Li, KL
    He, Y
    Liu, XL
    Wang, Y
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 1068 - 1072
  • [9] Security-Driven Task Scheduling Based on Evolutionary Algorithm
    Zhu, Hai
    Wang, Yuping
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1012 - 1017
  • [10] Cloud services security-driven evaluation for multiple tenants
    Sarah Maroc
    Jian Biao Zhang
    [J]. Cluster Computing, 2021, 24 : 1103 - 1121