a vulnerability and finally an effort estimate for ex-
ploiting found vulnerabilities. We presented an attack
surface taxonomy and definition that can be applied
to the heterogeneous combination of automotive com-
munication channels; We completely abstracted an
ECU’s communication as potential attack surface that
might be susceptible to code injection. We used a vul-
nerability density (ideally for every input channel sep-
arately) for estimating the overall vulnerability likeli-
hood of an ECU. We modelled a concept of reference
attacker profile and attack efforts for an extrapolation
on other, later-defined attacker profiles. Finally, we
gave an attacker effort estimation method for over-
coming active exploit mitigation techniques and suc-
cessfully exploiting an ECU. The result of our method
and metric serves as an input for our graph-based se-
curity analysis. The integration into it was demon-
strated as a proof of concept in Section 3. We thereby
showed that our contribution is not purely academic
but has also an industrial application. The created
method, metric and software helps assessing the se-
curity of embedded controller networks.The metric
implicitly suggests certain ways of securing ECUs:
covering attack surface with firewalls or authentica-
tion checks, shrinking an ECUs attack surface by re-
moving services and inbound data and by harden-
ing attack surface with more secure software (stricter
compiler and programming languages, more defen-
sive programming and exploit mitigation techniques).
The resulting attack surface assessment facilitates a
construction of attack graphs for an overall automo-
tive system security assessment.
Table 2: Symbols Definition.
a ∈ E Access Effort
b ∈ E Basic Exploitation Effort
c ∈ E Counter Exploit-Mitigation Effort
d ∈]0, 1[ Defect Density
e ∈ E Effort E = {(t, r)|t ∈ T ∧ r ∈ R}
f ∈ E Vulnerability Finding Effort
g ∈ E Overall Exploit Creation Effort
i, j ∈ N
>0
A Positive Natural Number
k, n ∈ N
>0
A Positive Natural Number
o ∈ E Overall ECU Exploitation Effort
P Probability Distribution Function
q ∈ [0, 1] Probability
r ∈ R Effort Amount ∈ R
≥0
t ∈ T Capability Tag (a Label)
v ∈]0, 1[ Vulnerability Density
x ∈ R An Arbitrary Real Number
X Probability Random Variable
REFERENCES
Alhazmi, O., Malaiya, Y., and Ray, I. (2005). Security vul-
nerabilities in software systems: A quantitative per-
spective. In Data and Applications Security XIX, num-
ber 3654 in Lecture Notes in Computer Science, pages
281–294. Springer Berlin Heidelberg.
Alhazmi, O. H., Malaiya, Y. K., and Ray, I. (2007). Mea-
suring, analyzing and predicting security vulnerabil-
ities in software systems. Computers & Security,
26(3):219–228.
Charlie Miller and Chris Valasek (2014). A survey of re-
mote automotive attack surfaces.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, F., and Kohno, T. (2011). Comprehensive
experimental analyses of automotive attack surfaces.
Proceedings of the 2011 Usenix Security.
Damm, W., Achatz, R., Beetz, K., Broy, M., Daembkes,
H., Grimm, K., and Liggesmeyer, P. (2010). Na-
tionale roadmap embedded systems. In Broy, M., ed-
itor, Cyber-Physical Systems, acatech DISKUTIERT,
pages 67–136. Springer Berlin Heidelberg.
Francillon, A., Danev, B., and Capkun, S. (2010). Relay
attacks on passive keyless entry and start systems in
modern cars. In Proceedings of NDSS.
Howard, M., Pincus, J., and Wing, J. M. (2005). Measuring
relative attack surfaces. In Computer Security in the
21st Century, pages 109–137. Springer US.
Ishtiaq Rouf, R. M., Mustafa, H., Travis Taylor, S. O., Xu,
W., Gruteser, M., Trappe, W., and Seskar, I. (2010).
Security and privacy vulnerabilities of in-car wire-
less networks: A tire pressure monitoring system case
study. In 19th USENIX Security Symposium, Wash-
ington DC, pages 11–13.
Kayaalp, M., Ozsoy, M., Ghazaleh, N., and Ponomarev,
D. (2014). Efficiently securing systems from code
reuse attacks. IEEE Transactions on Computers,
63(5):1144–1156.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., and Savage, S. (2010). Experimental
security analysis of a modern automobile. In IEEE
Symposium on Security and Privacy, pages 447–462.
Manadhata, P. and Wing, J. (2011). An attack surface
metric. IEEE Transactions on Software Engineering,
37(3):371–386.
Roschke, S., Cheng, F., Schuppenies, R., and Meinel, C.
(2009). Towards unifying vulnerability information
for attack graph construction. In 12th International
Conference on Information Security, ISC 2009, pages
218–233, Berlin, Heidelberg. Springer-Verlag.
Schneier, B. (2012). The importance of security engineer-
ing. IEEE Security & Privacy, 10(5):88–88.
SECRYPT 2015 - International Conference on Security and Cryptography
326