Figure 5: UML model to specify the simulation structure.
connects them. Figure 5 highlights such a specifica-
tion. It instantiates the classes from Figure 3 and in-
terconnects them. With such a specification, the con-
figuration file is generated and the simulation is ex-
ecuted. The example shows the structural specifica-
tion of the previous example with a head unit an inter-
nal CAN (Body-CAN) and a public CAN (Comfort-
CAN). Both are interconnected via a gateway that is
the target of the analysed attack.
6 CONCLUSION
In this paper, we outlined our ambition towards the
modeling of security concepts in the context of VP-
based security analyses. Modeling is applied for the
specification of the attack surface, protection goals
and further documentation. With this comprehensive
information base, different security analysis based on
VPs are executed, such as a dynamic data propagation
analysis or virtual penetration testing. Currently the
available analyses are largely manual tasks e.g., the
interpretation of the data propagation analysis to see
if the attack surface is linked to the protection goals,
without security measures. In the future, we will try
to automate the tasks and reduce the manual overhead
for the user. The presented modeling approach al-
ready provides various steps of automation, but these
mainly support the user to generate the VP and plan
the attack scenarios.
ACKNOWLEDGEMENTS
The work was partially funded by the Baden-
Württemberg Stiftung gGmbH.
REFERENCES
Basin, D., Doser, J., and Lodderstedt, T. (2006). Model
driven security: From uml models to access control
infrastructures. ACM Trans. Softw. Eng. Methodol.
Best, B., Jurjens, J., and Nuseibeh, B. (2007). Model-based
security engineering of distributed information sys-
tems using umlsec. In 29th International Conference
on Software Engineering.
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., and
Mylopoulos, J. (2004). Tropos: An agent-oriented
software development methodology. Autonomous
Agents and Multi-Agent Systems, 8(3):203–236.
Charlie, M. and Chris, V. (2015). Remote exploitation of an
unaltered passenger vehicle. Black Hat USA, 2015.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, F., and Kohno, T. (2011). Comprehensive
experimental analyses of automotive attack surfaces.
In Proceedings of the 20th USENIX Conference on
Security, SEC’11, pages 6–6, Berkeley, CA, USA.
USENIX Association.
IEEE Computer Society (2011). IEEE 1666-2011 Stan-
dard SystemC Language Reference Manual. IEEE Std
1666-2011.
Jürjens, J. (2002). Umlsec: Extending uml for secure
systems development. In Proceedings of the 5th
International Conference on The Unified Modeling
Language, UML ’02, pages 412–425, London, UK.
Springer-Verlag.
Jürjens, J. (2010). Secure Systems Development with UML.
Springer-Verlag, Berlin, Heidelberg.
Lodderstedt, T., Basin, D., and Doser, J. (2002). Se-
cureUML: A UML-Based Modeling Language for
Model-Driven Security, pages 426–441. Springer
Berlin Heidelberg, Berlin, Heidelberg.
Massacci, F., Mylopoulos, J., and Zannone, N. (2010). Se-
curity Requirements Engineering: The SI* Modeling
Language and the Secure Tropos Methodology, pages
147–174. Springer, Berlin, Heidelberg.
OMG (2011a). Meta Object Facility (MOF) 2.0
Query/View/Transformation Specification.
OMG (2011b). Unified Modeling Language.
OMG (2012). OMG Systems Modeling Language (OMG
SysML).
Reiter, S., Viehl, A., Bringmann, O., and Rosenstiel, W.
(2016). Fault injection ecosystem for assisted safety
validation of automotive systems. In 2016 IEEE Int.
High Level Design Validation and Test Workshop.
Sommestad, T., Ekstedt, M., and Holm, H. (2013). The cy-
ber security modeling language: A tool for assessing
the vulnerability of enterprise system architectures.
IEEE Systems Journal, 7(3):363–373.
SPIRIT Consortium (2009). IEEE Standard for IP-XACT,
Standard Structure for Packaging, Integrating, and
Reusing IP within Tool Flows.
Model-guided Security Analysis of Interconnected Embedded Systems
609