{"title":"Social Engineering Exploits in Automotive Software Security: Modeling Human-targeted Attacks with SAM","authors":"Matthias Bergler, Juha-Pekka Tolvanen, M. Zoppelt, Ramin Tavakoli Kolagari","doi":"10.3850/978-981-18-2016-8_720-cd","DOIUrl":null,"url":null,"abstract":"Security cannot be implemented into a system retrospectively without considerable effort, so security must be taken into consideration already at the beginning of the system development. The engineering of automotive software is by no means an exception to this rule. For addressing automotive security, the AUTOSAR and EAST-ADL standards for domain-specific system and component modeling provide the central foundation as a start. The EASTADL extension SAM enables fully integrated security modeling for traditional feature-targeted attacks. Due to the COVID-19 pandemic, the number of cyber-attacks has increased tremendously and of these, about 98 percent are based on social engineering attacks. These social engineering attacks exploit vulnerabilities in human behaviors, rather than vulnerabilities in a system, to inflict damage. And these social engineering attacks also play a relevant but nonetheless regularly neglected role for automotive software. The contribution of this paper is a novel modeling concept for social engineering attacks and their criticality assessment integrated into a general automotive software security modeling approach. This makes it possible to relate social engineering exploits with feature-related attacks. To elevate the practical usage, we implemented an integration of this concept into the established, domain-specific modeling tool MetaEdit+. The tool support enables collaboration between stakeholders, calculates vulnerability scores, and enables the specification of security objectives and measures to eliminate vulnerabilities. © ESREL 2021. Published by Research Publishing, Singapore.","PeriodicalId":187633,"journal":{"name":"Proceedings of the 31st European Safety and Reliability Conference (ESREL 2021)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 31st European Safety and Reliability Conference (ESREL 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3850/978-981-18-2016-8_720-cd","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
汽车软件安全中的社会工程漏洞:用SAM建模人类目标攻击
如果没有相当大的努力,就不能回顾性地将安全性实现到系统中,因此必须在系统开发的开始就考虑安全性。汽车软件工程绝不是这条规则的例外。为了解决汽车安全问题,针对特定领域的系统和组件建模的AUTOSAR和EAST-ADL标准提供了一个中心基础。EASTADL扩展SAM为传统的以特性为目标的攻击提供了完全集成的安全建模。由于新冠肺炎疫情,网络攻击数量急剧增加,其中98%是基于社会工程攻击。这些社会工程攻击利用人类行为中的漏洞,而不是系统中的漏洞来造成破坏。这些社会工程攻击也对汽车软件起到了相关但经常被忽视的作用。本文的贡献是为社会工程攻击及其临界性评估提供了一个新的建模概念,并将其集成到通用的汽车软件安全建模方法中。这使得将社会工程利用与特性相关的攻击联系起来成为可能。为了提升实际应用,我们将这个概念集成到已建立的、特定于领域的建模工具MetaEdit+中。该工具支持在涉众之间进行协作,计算漏洞分数,并支持安全目标和措施的规范,以消除漏洞。©esrel 2021。新加坡研究出版社出版。
本文章由计算机程序翻译,如有差异,请以英文原文为准。