{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:36:28Z","timestamp":1743068188612,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030839055"},{"type":"electronic","value":"9783030839062"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83906-2_2","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"24-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Rule-Based Threat Analysis and Mitigation for the Automotive Domain"],"prefix":"10.1007","author":[{"given":"Abdelkader Magdy","family":"Shaaban","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Jaksic","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Veledar","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Mauthner","sequence":"additional","affiliation":[]},{"given":"Edin","family":"Arnautovic","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Schmittner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Mobility","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-14156-1_4","volume-title":"Electronic Components and Systems for Automotive Applications","author":"E Armengaud","year":"2019","unstructured":"Armengaud, E., Peischl, B., Priller, P., Veledar, O.: Automotive meets ICT\u2014enabling the shift of value creation supported by European R&D. In: Langheim, J. (ed.) Electronic Components and Systems for Automotive Applications. LNM, pp. 45\u201355. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14156-1_4"},{"unstructured":"Veledar, O.: New business models to realise benefits of the IoT technology within the automotive industry. Master\u2019s thesis, WU Executive Academy (2019)","key":"2_CR2"},{"unstructured":"SAE J3016: Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles. Technical Report, SAE International (2018)","key":"2_CR3"},{"unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley (2014). OCLC: ocn855043351","key":"2_CR4"},{"unstructured":"ThreatGet: Threat analysis and risk management. https:\/\/www.threatget.com\/. Accessed 9 Feb 2021","key":"2_CR5"},{"unstructured":"Microsoft Threat Modeling Tool. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=49168. Accessed 9 Feb 2021","key":"2_CR6"},{"unstructured":"ISA: The 62443 series of standards: industrial automation and control systems security (1\u20134) (2018)","key":"2_CR7"},{"unstructured":"ISO 15408: Information technology - security techniques - evaluation criteria for IT security Common Criteria - part 1: introduction and general model (2009)","key":"2_CR8"},{"doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: Ninth International Conference on Computational Intelligence and Security, pp. 663\u2013667. IEEE (2013)","key":"2_CR9","DOI":"10.1109\/CIS.2013.145"},{"unstructured":"Veledar, O., et al.: Safety and security of IoT-based solutions for autonomous driving: architectural perspective (2019)","key":"2_CR10"},{"doi-asserted-by":"crossref","unstructured":"Burzio, G., Cordella, G.F., Colajanni, M., Marchetti, M., Stabili, D.: Cybersecurity of connected autonomous vehicles: a ranking based approach. In: 2018 International Conference of Electrical and Electronic Technologies for Automotive, pp. 1\u20136. IEEE (2018)","key":"2_CR11","DOI":"10.23919\/EETA.2018.8493180"},{"doi-asserted-by":"crossref","unstructured":"Shaaban, A.M., Schmittner, C., Gruber, T., Mohamed, A.B., Quirchmayr, G., Schikuta, E.: Ontology-based model for automotive security verification and validation. In: Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, pp. 73\u201382 (2019)","key":"2_CR12","DOI":"10.1145\/3366030.3366070"},{"unstructured":"Ruddle, A., Ward, D., Weyl, B., et al.: Security requirements for automotive on-board networks based on dark-side scenarios. EVITA Deliverable D 2(3) (2009)","key":"2_CR13"},{"unstructured":"Islam, M., et al.: Deliverable d1.1 needs and requirements. HEAVENS Project (2016)","key":"2_CR14"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.14257\/astl.2016.139.68","volume":"139","author":"Z Ma","year":"2016","unstructured":"Ma, Z., Schmittner, C.: Threat modeling for automotive security analysis. Adv. Sci. Technol. Lett. 139, 333\u2013339 (2016)","journal-title":"Adv. Sci. Technol. Lett."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-319-99229-7_19","volume-title":"Computer Safety, Reliability, and Security","author":"AM Shaaban","year":"2018","unstructured":"Shaaban, A.M., Kristen, E., Schmittner, C.: Application of IEC 62443 for IoT components. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11094, pp. 214\u2013223. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99229-7_19"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-55583-2_9","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops","author":"G Macher","year":"2020","unstructured":"Macher, G., Schmittner, C., Veledar, O., Brenner, E.: ISO\/SAE DIS 21434 automotive cybersecurity standard - in a nutshell. In: Casimiro, A., Ortmeier, F., Schoitsch, E., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12235, pp. 123\u2013135. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55583-2_9"},{"unstructured":"Shevchenko, N.: Threat modeling: 12 available methods 2018. https:\/\/insights.sei.cmu.edu\/sei_blog\/2018\/12\/threat-modeling-12-available-methods.html. Accessed 26 Apr 2021","key":"2_CR18"},{"doi-asserted-by":"crossref","unstructured":"Souag, A., Salinesi, C., Wattiau, I., Mouratidis, H.: Using security and domain ontologies for security requirements analysis. In: 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, pp. 101\u2013107. IEEE (2013)","key":"2_CR19","DOI":"10.1109\/COMPSACW.2013.124"},{"unstructured":"Magdy, A., Schmittner, C., Gruber, T., Baith Mohamed, A., Quirchmayr, G., Schikuta, R.: Ontology-based model for automotive security verification and validation. In: 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019, December 2019","key":"2_CR20"},{"unstructured":"Bartsch, M., Bobel, A., Nieh\u00f6fer, B., Wagner, M., Wahner, M.: OTP Protection profile of an automotive gateway (2020). https:\/\/unece.org\/fileadmin\/DAM\/trans\/doc\/2020\/wp29\/WP29-181-10e.pdf","key":"2_CR21"},{"unstructured":"Enterprise Architect (2021). http:\/\/www.sparxsystems.com\/. Accessed 4 Apr 2021","key":"2_CR22"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-030-26250-1_5","volume-title":"Computer Safety, Reliability, and Security","author":"M El Sadany","year":"2019","unstructured":"El Sadany, M., Schmittner, C., Kastner, W.: Assuring compliance with protection profiles with ThreatGet. In: Romanovsky, A., Troubitsyna, E., Gashi, I., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11699, pp. 62\u201373. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26250-1_5"},{"unstructured":"Shaaban, A.M., Schmittner, C.: ThreatGet: new approach towards automotive security-by-design. In: 28th Interdisciplinary Information Management Talks, pp. 413\u2013419 (2020)","key":"2_CR24"},{"unstructured":"Ontotext: What are ontologies? (2018). https:\/\/ontotext.com\/knowledgehub\/fundamentals\/what-are-ontologies\/. Accessed 19 Feb 2021","key":"2_CR25"},{"unstructured":"W3C Member: SWRL: a semantic web rule language (2004). https:\/\/www.w3.org\/Submission\/SWRL\/. Accessed 26 Apr 2021","key":"2_CR26"},{"unstructured":"O\u2019Connor, M.J.: SWRLAPI (2019). https:\/\/github.com\/protegeproject\/swrlapi. Accessed 8 Feb 2021","key":"2_CR27"},{"unstructured":"O\u2019Connor, M.J.: Reasoner not yet wired up (2020). https:\/\/github.com\/protegeproject\/swrlapi\/issues\/65. Accessed 8 Feb 2021","key":"2_CR28"},{"unstructured":"O\u2019Connor, M.J., Das, A.K.: SQWRL: a query language for OWL. In: OWLED, vol. 529 (2009)","key":"2_CR29"},{"doi-asserted-by":"crossref","unstructured":"B\u00fccs, R.L., Lakshman, P., Weinstock, J.H., Walbroel, F., Leupers, R., Ascheid, G.: Fully virtual rapid ADAS prototyping via a joined multi-domain co-simulation ecosystem. In: VEHITS, pp. 59\u201369 (2018)","key":"2_CR30","DOI":"10.5220\/0006665900590069"},{"unstructured":"RazorMotion (2021). https:\/\/www.tttech-auto.com\/products\/automated-driving\/razormotion-tttech-auto\/. Accessed 8 Feb 2021","key":"2_CR31"},{"doi-asserted-by":"crossref","unstructured":"D\u2019Amato, A., Pianese, C., Arsie, I., Armeni, S., Nesci, W., Peciarolo, A.: Development and on-board testing of an ADAS-based methodology to enhance cruise control features towards CO$$_2$$ reduction. In: 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 503\u2013508. IEEE (2017)","key":"2_CR32","DOI":"10.1109\/MTITS.2017.8005724"},{"unstructured":"International Organization for Standardization: ISO 26262:2018 road vehicles - functional safety (2018)","key":"2_CR33"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83906-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:39:37Z","timestamp":1710265177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83906-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839055","9783030839062"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83906-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}