{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:16:01Z","timestamp":1770977761253,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ECSEL Joint Undertaking","award":["101007326"],"award-info":[{"award-number":["101007326"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,5]]},"DOI":"10.1145\/3631204.3631864","type":"proceedings-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T12:05:32Z","timestamp":1701691532000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8556-1541","authenticated-orcid":false,"given":"Stefan F","family":"Marksteiner","sequence":"first","affiliation":[{"name":"AVL List GmbH, AT and M\u00e4lardalen University, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4430-6813","authenticated-orcid":false,"given":"Christoph","family":"Schmittner","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology GmbH, AT"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8873-9122","authenticated-orcid":false,"given":"Korbinian","family":"Christl","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology GmbH, AT"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5468-0396","authenticated-orcid":false,"given":"Dejan","family":"Nickovic","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology GmbH, AT"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7586-0409","authenticated-orcid":false,"given":"Mikael","family":"Sj\u00f6din","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, SE"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5478-0987","authenticated-orcid":false,"given":"Marjan","family":"Sirjani","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, SE"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amenaza Technologies Limited. 2023. SecurITree. Online. https:\/\/www.amenaza.com Accessed: 2023-10-03."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2019.00045"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93524-9_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/info14010014"},{"key":"e_1_3_2_1_6_1","volume-title":"The analysis approach of ThreatGet. CoRR abs\/2107.09986","author":"Christl Korbinian","year":"2021","unstructured":"Korbinian Christl and Thorsten Tarrach. 2021. The analysis approach of ThreatGet. CoRR abs\/2107.09986 (2021), 57\u00a0pages. arXiv:2107.09986https:\/\/arxiv.org\/abs\/2107.09986"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39945-3_13"},{"key":"e_1_3_2_1_8_1","volume-title":"Integrated Threat Modelling. Master\u2019s thesis","author":"Eng Dag","unstructured":"Dag Eng. 2017. Integrated Threat Modelling. Master\u2019s thesis. University of Olso."},{"key":"e_1_3_2_1_9_1","unstructured":"Foreseeti AB. 2020. Foreseeti. Online. https:\/\/foreseeti.com\/ Accessed: 2020-11-29."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2017.11.01"},{"key":"e_1_3_2_1_11_1","unstructured":"Terrance\u00a0R Ingoldsby. 2021. Attack Tree-Based Threat Risk Analysis. Technical Report. Amenaza Technologies Limited."},{"key":"e_1_3_2_1_12_1","first-page":"2022","article-title":"Information Security","volume":"15408","author":"International Organization for Standardization.","year":"2022","unstructured":"International Organization for Standardization. 2022. Information Security, Cybersecurity and Privacy Protection \u2013 Evaluation Criteria for IT Security \u2013 Part 2: Security Functional Components. ISO\/IEC Standard 15408-2:2022. International Organization for Standardization.","journal-title":"ISO\/IEC Standard"},{"key":"e_1_3_2_1_13_1","volume-title":"Road Vehicles \u2013 Cybersecurity Engineering. ISO\/SAE Standard \"21434","author":"International Organization for Standardization and Society of Automotive Engineers. 2021.","unstructured":"International Organization for Standardization and Society of Automotive Engineers. 2021. Road Vehicles \u2013 Cybersecurity Engineering. ISO\/SAE Standard \"21434\". International Organization for Standardization."},{"key":"e_1_3_2_1_14_1","unstructured":"International Organization for Standardization and Society of Automotive Engineers. 2022. ISO\/SAE PAS8475 (WIP) Road Vehicles \u2013 Cybersecurity Assurance Levels and Targeted Attack Feasibility - SAE International. https:\/\/www.sae.org\/standards\/content\/iso\/sae%20pas8475\/."},{"key":"e_1_3_2_1_15_1","unstructured":"International Organization for Standardization and Society of Automotive Engineers. 2023. ISO\/SAE PAS8477 (WIP) Road Vehicles - Cybersecurity Verification and Validation - SAE International. https:\/\/www.sae.org\/standards\/content\/iso\/sae%20pas8477\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Isograph. 2023. Isograph AttackTree. Online. https:\/\/www.isograph.com\/software\/attacktree\/ Accessed: 2023-10-03."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360251"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"e_1_3_2_1_20_1","first-page":"800","article-title":"Practical Combinatorial Testing","author":"Kuhn D\u00a0Richard","year":"2010","unstructured":"D\u00a0Richard Kuhn, Raghu\u00a0N Kacker, and Yu Lei. 2010. Practical Combinatorial Testing. SP 800-142. National Institute of Standards and Technology.","journal-title":"SP"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0622"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448913"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"e_1_3_2_1_25_1","unstructured":"C.\u00a0C. Michael Ken van Wyk and Will Radosevich. 2005. Risk-Based and Functional Security Testing. Technical Report. U.S. Deparmtent of Homeland Security."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-46998-7_25"},{"key":"e_1_3_2_1_27_1","unstructured":"Carl\u00a0Adam Petri. 1962. Kommunikation mit Automaten. Ph.\u00a0D. Dissertation. Technische Universit\u00e4t Darmstadt."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"e_1_3_2_1_29_1","volume-title":"Assuring Compliance with Protection Profiles with ThreatGet. In SAFECOMP 2019 Workshops(Lecture Notes in Computer Science). Springer","author":"Sadany Magdy\u00a0El","year":"2019","unstructured":"Magdy\u00a0El Sadany, Christoph Schmittner, and Wolfgang Kastner. 2019. Assuring Compliance with Protection Profiles with ThreatGet. In SAFECOMP 2019 Workshops(Lecture Notes in Computer Science). Springer, Berlin, 62\u201373."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85521-5_36"},{"key":"e_1_3_2_1_31_1","volume-title":"Dobb\u2019s journal 24, 12","author":"Schneier Bruce","year":"1999","unstructured":"Bruce Schneier. 1999. Attack Trees. Dr. Dobb\u2019s journal 24, 12 (1999), 21\u201329."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJAIML.2020010102"},{"key":"e_1_3_2_1_33_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack. 2014. Threat Modeling: Designing for Security. John Wiley & Sons, Indianaplois, IN."},{"key":"e_1_3_2_1_34_1","unstructured":"Tutamantic Ltd.2020. Tutamen Threat Model Automator. Online. https:\/\/www.tutamantic.com\/ Accessed: 2020-11-29."},{"key":"e_1_3_2_1_35_1","unstructured":"United Nations Economic and Social Council - Economic Commission for Europe. 2020. UN Regulation on Uniform Provisions Concerning the Approval of Vehicles with Regard to Cyber Security and of Their Cybersecurity Management Systems. Technical Report ECE\/TRANS\/WP.29\/2020\/79. United Nations Economic and Social Council - Economic Commission for Europe \/ United Nations Economic and Social Council - Economic Commission for Europe Brussels."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Upstream Security. 2020. Upstream Security Global Automotive Cybersecurity Report. Technical Report. Upstream Security.","DOI":"10.1016\/S1353-4858(20)30005-2"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.4271\/2013-01-1415"},{"key":"e_1_3_2_1_38_1","unstructured":"Jan Was Pooja Avhad Matthew Coles Nick Ozmore Rohit Shambhuni and Izar Tarandach. 2020. OWASP pytm. Online. https:\/\/owasp.org\/www-project-pytm\/ Accessed: 2020-11-29."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470070"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.09.003"}],"event":{"name":"CSCS '23: Computer Science in Cars Symposium","location":"Darmstadt Germany","acronym":"CSCS '23","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 7th ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631204.3631864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631204.3631864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:24:32Z","timestamp":1755973472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631204.3631864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"references-count":40,"alternative-id":["10.1145\/3631204.3631864","10.1145\/3631204"],"URL":"https:\/\/doi.org\/10.1145\/3631204.3631864","relation":{},"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"2023-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}