Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A taxonomy of attack mechanisms in the automotive domain
University of Innsbruck, AUT.
University of Innsbruck, AUT.
AV-Comparatives GmbH, AUT.
Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.ORCID iD: 0000-0003-3818-4442
2021 (English)In: Computer Standards & Interfaces, ISSN 0920-5489, E-ISSN 1872-7018, Vol. 78, article id 103539Article in journal (Refereed) Published
Abstract [en]

In the last decade, the automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. In comparison to older types of vehicles, where the biggest concern was physical security, modern vehicles might be targeted remotely. As a result, multiple attack vectors aiming to disrupt different vehicle components emerged. Research and practice lack a comprehensive attack taxonomy for the automotive domain. In this regard, we conduct a systematic literature study, wherein 48 different attacks were identified and classified according to the proposed taxonomy of attack mechanisms. The taxonomy can be utilized by penetration testers in the automotive domain as well as to develop more sophisticated attacks by chaining multiple attack vectors together. In addition, we classify the identified attack vectors based on the following five dimensions: (1) AUTOSAR layers, (2) attack domains, (3) information security principles, (4) attack surfaces, and (5) attacker profile. The results indicate that the most applied attack vectors identified in literature are GPS spoofing, message injection, node impersonation, sybil, and wormhole attack, which are mostly applied to application and services layers of the AUTOSAR architecture. © 2021 The Author(s)

Place, publisher, year, edition, pages
Elsevier B.V. , 2021. Vol. 78, article id 103539
Keywords [en]
Attack mechanisms, Attack modeling, Automotive engineering, Security testing, Systematic review, Vehicle security, Electronics industry, Security of data, Vectors, Vehicles, Attack mechanism, Automotive domains, Different attacks, Electronic component, Literature studies, Physical security, Vehicle components, Wormhole attack, Taxonomies
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:bth-21396DOI: 10.1016/j.csi.2021.103539ISI: 000670669600002Scopus ID: 2-s2.0-85104950246OAI: oai:DiVA.org:bth-21396DiVA, id: diva2:1555002
Note

open access

Available from: 2021-05-17 Created: 2021-05-17 Last updated: 2021-09-02Bibliographically approved

Open Access in DiVA

fulltext(1785 kB)735 downloads
File information
File name FULLTEXT01.pdfFile size 1785 kBChecksum SHA-512
004dad3a5c58e0f259dd8d33eb3ccda4d7d37c3ab84d8d6b627c248838437f059ecffe6a67ac3b59887ff4541e7b2dd8558a89909c8dbecb9166f98802c36a25
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Felderer, Michael

Search in DiVA

By author/editor
Felderer, Michael
By organisation
Department of Software Engineering
In the same journal
Computer Standards & Interfaces
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 735 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 313 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf