Custom cover image
Custom cover image

Automotive Security Analyzer for Exploitability Risks : An Automated and Attack Graph-Based Evaluation of On-Board Networks / by Martin Salfer

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Wiesbaden : Springer Fachmedien Wiesbaden, 2024Publisher: Wiesbaden : Imprint: Springer Vieweg, 2024Edition: 1st ed. 2024Description: 1 Online-Ressource(XXV, 243 p. 58 illus., 48 illus. in color. Textbook for German language market.)ISBN:
  • 9783658435066
Subject(s): Additional physical formats: 9783658435059 | 9783658435073 | Erscheint auch als: 9783658435059 Druck-Ausgabe | Erscheint auch als: 9783658435073 Druck-AusgabeDDC classification:
  • 006.22 23
DOI: DOI: 10.1007/978-3-658-43506-6Online resources: Summary: Introduction -- Basics and Related Work -- Models -- Single-Path Attack Graph Algorithm -- Multi-Path Attack Graph Algorithm -- Conclusion -- References.Summary: Our lives depend on automotive cybersecurity, protecting us inside and near vehicles. If vehicles go rogue, they can operate against the driver’s will and potentially drive off a cliff or into a crowd. The “Automotive Security Analyzer for Exploitability Risks” (AutoSAlfER) evaluates the exploitability risks of automotive on-board networks by attack graphs. AutoSAlfER’s Multi-Path Attack Graph algorithm is 40 to 200 times smaller in RAM and 200 to 5 000 times faster than a comparable implementation using Bayesian networks, and the Single-Path Attack Graph algorithm constructs the most reasonable attack path per asset with a computational, asymptotic complexity of only O(n * log(n)), instead of O(n²). AutoSAlfER runs on a self-written graph database, heuristics, pruning, and homogenized Gaussian distributions and boosts people’s productivity for a more sustainable and secure automotive on-board network. Ultimately, we enjoy more safety and security in and around autonomous, connected, electrified, and shared vehicles. About the author Dr. Martin Salfer is an IT security researcher at TUM and a tech lead at an automaker. He earned his Ph.D. in IT Security from TUM, completed his M.Sc. with honours in Software Engineering at UniA/LMU/TUM, and obtained his B.Sc. in Computer Science from HM, with a study abroad at KPU in Vancouver, Canada, and ESIEA in Paris, France, and a research visit at NII in Tokyo, Japan. He is the lead author of 28 publications, including five IT security patents.PPN: PPN: 1883768306Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-STI
No physical items for this record