Authors:
Sotirios Katsikeas
1
;
Pontus Johnson
1
;
Simon Hacks
2
and
Robert Lagerström
1
Affiliations:
1
Department of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm and Sweden
;
2
Research Group Software Construction, RWTH Aachen University, Aachen and Germany
Keyword(s):
Domain Specific Language, Cyber Security, Threat Modeling, Attack Graphs, Vehicular Security.
Abstract:
Attack simulations are a feasible means to assess the cyber security of systems. The simulations trace the steps taken by an attacker to compromise sensitive system assets. Moreover, they allow to estimate the time conducted by the intruder from the initial step to the compromise of assets of interest. One commonly accepted approach for such simulations are attack graphs, which model the attack steps and their dependencies in a formal way. To reduce the effort of creating new attack graphs for each system of a given type, domain-specific attack languages may be employed. They codify common attack logics of the considered domain. Consequently, they ease the reuse of models and, thus, facilitate the modeling of a specific system in the domain. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop domain specific attack languages. In this article, we present vehicleLang, a Domain Specific Language (DSL) which can be used to model vehicles with r
espect to their IT infrastructure and to analyze their weaknesses related to known attacks. To model domain specifics in our language, we rely on existing literature and verify the language using an interview with a domain expert from the automotive industry. To evaluate our results, we perform a Systematic Literature Review (SLR) to identify possible attacks against vehicles. Those attacks serve as a blueprint for test cases checked against the vehicleLang specification.
(More)