Towards Comprehensive Threat Modeling for Intelligent Vehicle Cyber Security

CICTP 2017 ◽  
2018 ◽  
Author(s):  
Haojie Ji ◽  
Guizhen Yu ◽  
Yunpeng Wang ◽  
Zhao Zhang ◽  
Hongmao Qin
2021 ◽  
Author(s):  
Jide Ebenezer Taiwo Akinsola ◽  
Samuel Akinseinde ◽  
Olamide Kalesanwo ◽  
Moruf Adeagbo ◽  
Kayode Oladapo ◽  
...  

In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.


Author(s):  
Wenjun Xiong ◽  
Emeline Legrand ◽  
Oscar Åberg ◽  
Robert Lagerström

AbstractEnterprise systems are growing in complexity, and the adoption of cloud and mobile services has greatly increased the attack surface. To proactively address these security issues in enterprise systems, this paper proposes a threat modeling language for enterprise security based on the MITRE Enterprise ATT&CK Matrix. It is designed using the Meta Attack Language framework and focuses on describing system assets, attack steps, defenses, and asset associations. The attack steps in the language represent adversary techniques as listed and described by MITRE. This entity-relationship model describes enterprise IT systems as a whole; by using available tools, the proposed language enables attack simulations on its system model instances. These simulations can be used to investigate security settings and architectural changes that might be implemented to secure the system more effectively. Our proposed language is tested with a number of unit and integration tests. This is visualized in the paper with two real cyber attacks modeled and simulated.


2020 ◽  
Author(s):  
Bharadwaj Mantha ◽  
Borja García de Soto ◽  
Ramesh Karri

The digitalization and automation of the construction sector, known as Construction 4.0, are transforming positively the way we plan, design, execute, and operate construction projects. However, they are also increasing the vulnerability of construction projects and making the architecture, engineering, construction, and facility management (AEC-FM) industry subject to cyberattacks. Although current cybersecurity practices are relevant, they cannot be directly adopted because of the unique challenges faced by the AEC-FM industry, such as complex supply chains, interoperability, and dynamic workforce from project to project. Current literature suggests that, though current standards and practices are relevant, industry-specific studies need to be conducted before they can be successfully integrated. To that extent, this study investigates the cybersecurity threat modeling for construction projects by developing a framework that identifies what might be compromised, how might it happen, why would someone intend to do it, what would be the impact, and what could be done to prevent it. Specifically, the objectives are to a) develop a preliminary threat model relevant to construction that can be used by construction stakeholders with minimal cybersecurity expertise, b) show the feasibility of the approach by using illustrative threat models for each of the life cycle phases of a construction project, and c) use the commissioning phase of a building as a case study to show a possible countermeasure for the cyber threats that could occur during the testing or certification process of a given system. This study addresses essential components to enable the full potential of (i.e., digitalization and automation of the construction industry) and define research areas needed to pave the roadmap for the future of the construction industry and successful development of Construction 4.0. The proposed framework will help analyze, examine, and address the safety and security of stakeholders and systems during crucial phases of a construction project (e.g., pre-construction, construction, and operation).


2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document