{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:06:36Z","timestamp":1762459596071},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319935232"},{"type":"electronic","value":"9783319935249"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93524-9_7","type":"book-chapter","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T06:37:00Z","timestamp":1529476620000},"page":"113-129","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications"],"prefix":"10.1007","author":[{"given":"Madeline","family":"Cheah","sequence":"first","affiliation":[]},{"given":"Hoang Nga","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Bryans","sequence":"additional","affiliation":[]},{"given":"Siraj A.","family":"Shaikh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,21]]},"reference":[{"key":"7_CR1","unstructured":"Argus Cybersecurity: Argus Cyber Security Working with Bosch to Promote Public Safety and Mitigate Car Hacking (2017). http:\/\/bit.ly\/2tNBLsm"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Cheah, M., Bryans, J., Fowler, D.S., Shaikh, S.A.: Threat intelligence for bluetooth-enabled systems with automotive applications: an empirical study. In: Proceedings of the 47th IEEE\/IFIP Dependable Systems and Networks Workshops: Security and Safety in Vehicles (SSIV). IEEE, Denver, June 2017","DOI":"10.1109\/DSN-W.2017.22"},{"issue":"7","key":"7_CR3","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.vehcom.2017.02.008","volume":"9","author":"M Cheah","year":"2017","unstructured":"Cheah, M., Shaikh, S., Haas, O., Ruddle, A.: Towards a systematic security evaluation of the automotive bluetooth interface. J. Veh. Commun. 9(7), 8\u201318 (2017)","journal-title":"J. Veh. Commun."},{"key":"7_CR4","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of 20th USENIX Security Symposium, pp. 77\u201392. USENIX Association, San Francisco, August 2011"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, pp. 1044\u20131055. ACM, New York, October 2016","DOI":"10.1145\/2976749.2978302"},{"key":"7_CR6","unstructured":"Dunning, J.: SpoofTooph (2012). http:\/\/bit.ly\/2tiOx5O"},{"key":"7_CR7","unstructured":"ELM Electronics: ELM Electronics: OBD. http:\/\/bit.ly\/2s0yZPZ"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1002\/stvr.1580","volume":"26","author":"M Felderer","year":"2015","unstructured":"Felderer, M., Zech, P., Breu, R., Buchler, M., Pretschner, A.: Model-based security testing: a taxonomy and systematic classification. Softw. Test. Verif. Reliab. 26(2), 119\u2013148 (2015)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Fowler, D.S., Cheah, M., Shaikh, S.A., Bryans, J.: Towards a testbed for automotive cyberecurity. In: Process of the 10th International Conference on Software Testing, Verification and Validation: Industry Track. IEEE, Tokyo, March 2017","DOI":"10.1109\/ICST.2017.62"},{"key":"7_CR10","unstructured":"Greenberg, A.: Hackers remotely kill a jeep on the highway-with me in it (2015). http:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/"},{"key":"7_CR11","volume-title":"Communicating Sequential Processes","author":"C Hoare","year":"1985","unstructured":"Hoare, C.: Communicating Sequential Processes, Electronic edn. Prentice Hall International, Upper Saddle River (1985)","edition":"Electronic"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ress.2010.06.026","volume":"96","author":"T Hoppe","year":"2011","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1), 11\u201325 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"7_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-18467-8_23","volume-title":"ICT Systems Security and Privacy Protection","author":"R Jhawar","year":"2015","unstructured":"Jhawar, R., Kordy, B., Mauw, S., Radomirovi\u0107, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 339\u2013353. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_23"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE, Oakland, May 2010","DOI":"10.1109\/SP.2010.34"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734727_17"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s00165-012-0258-z","volume":"26","author":"S Nogueira","year":"2014","unstructured":"Nogueira, S., Sampaio, A., Mota, A.: Test generation from state based use case models. Form. Asp. Comput. 26(3), 441\u2013490 (2014)","journal-title":"Form. Asp. Comput."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Oka, D.K., Furue, T., Langenhop, L., Nishimura, T.: Survey of vehicle IoT bluetooth devices. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 260\u2013264. IEEE, Matsue, November 2014","DOI":"10.1109\/SOCA.2014.20"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Broy, M., Kruger, I.H., Stauner, T.: Software engineering for automotive systems: a roadmap. In: Proceedings of the FOSE\u201907 2007 Future of Software Engineering, pp. 55\u201371. IEEE, Minneapolis, May 2007","DOI":"10.1109\/FOSE.2007.22"},{"key":"7_CR19","unstructured":"Robert Bosch GmbH: CAN Specification Version 2.0 (1991). http:\/\/esd.cs.ucr.edu\/webres\/can20.pdf"},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-258-0","volume-title":"Understanding Concurrent Systems","author":"A Roscoe","year":"2010","unstructured":"Roscoe, A.: Understanding Concurrent Systems, 1st edn. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84882-258-0","edition":"1"},{"key":"7_CR21","unstructured":"Ruddle, A., Ward, D., Weyl, B., Idrees, S., Roudier, Y., Friedewald, M., Leimbach, T., Fuchs, A., Gurgens, S., Henniger, O., Rieke, R., Ritsscher, M., Broberg, H., Apvrille, L., Pacalet, R., Pedroza, G.: EVITA project: deliverable D2.3 - security requirements for automotive on-board networks based on dark-side scenarios. Technical report (2009). http:\/\/www.evita-project.org\/Deliverables\/EVITAD2.3.pdf"},{"key":"7_CR22","unstructured":"SAE International: SAE J1979 E\/E Diagnostic Test Modes (2014). http:\/\/standards.sae.org\/j1979_201408\/"},{"key":"7_CR23","unstructured":"SAE International: J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (2016). http:\/\/standards.sae.org\/j3061_201601\/"},{"key":"7_CR24","first-page":"442","volume-title":"Lecture Notes in Computer Science","author":"Martin Salfer","year":"2014","unstructured":"Salfer, M., Schweppe, H., Eckert, C.: Efficient attack forest construction for automotive on-board networks. In: Chow, S.S., Camenisch, J., Hui, L.C., Yiu, S.M. (eds.) 17th International Conference (ISC) on Information Security, October 2014"},{"key":"7_CR25","unstructured":"Schneier, B.: Attack trees: modeling security threats (1999). http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html"},{"key":"7_CR26","unstructured":"University of Oxford: FDR3 - The CSP Refinement Checker. https:\/\/www.cs.ox.ac.uk\/projects\/fdr\/"},{"issue":"5","key":"7_CR27","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. 22(5), 297\u2013312 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Nielson, H.R.: Automated generation of attack trees. In: Proceedings of the 27th Computer Security Foundations Symposium. IEEE, Vienna (2014)","DOI":"10.1109\/CSF.2014.31"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93524-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T18:26:35Z","timestamp":1571509595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93524-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319935232","9783319935249"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93524-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}