ThreatGet: Threat modeling based approach for automated and connected vehicle systems

Christoph Schmittner, Sebastian Chlup, Andreas Fellner, Georg Macher, Eugen Brenner

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung


Connected and automated vehicle systems need to consider a wider range of factors to ensure dependable systems. While Cyber Security is increasingly important for modern automotive systems, performance and safety is equally important. Recent events demonstrate weaknesses in current systems. Quality of life and our society depends to an high degree on trust and dependable mobility and transportation. Upcoming regulations and standards will therefore require a ongoing management of Cyber Security, Functional Safety and Safety of the Intended Functionality risks in the vehicle lifecycle. Risk management depends on identification of all risks. Due to the complexity of modern automotive systems traditional manual approaches of risk identification are challenging. We present here a model-based approach for automated risk identification by ThreatGet, a Enterprise Architect plugin developed by AIT. ThreatGet contains a formal description of potential weaknesses which can be applied to different automotive systems to identify applicable threats. In this way knowledge can be reused along multiple engineering projects.

TitelAmE 2020
UntertitelAutomotive meets Electronics - 11. GMM-Fachtagung
Herausgeber (Verlag)VDE
ISBN (elektronisch)9783800752034
ISBN (Print)978-3-8007-5202-7
PublikationsstatusVeröffentlicht - 10 Mär 2020
Veranstaltung11. GMM-Fachtagung Automotive meets Electronics: AmE 2020 - Dortmund, Deutschland
Dauer: 10 Mär 202011 Mär 2020


NameAmE 2020: Automotive meets Electronics - 11. GMM-Fachtagung


Konferenz11. GMM-Fachtagung Automotive meets Electronics

ASJC Scopus subject areas

  • Elektrotechnik und Elektronik
  • Fahrzeugbau


Untersuchen Sie die Forschungsthemen von „ThreatGet: Threat modeling based approach for automated and connected vehicle systems“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren