Holm, H., Sommestad, T., Franke, U., and Ekstedt, M.
(2012). Success rate of remote code execution attacks
- expert assessments and observations. Journal of Uni-
versal Computer Science, 18(6):732–749.
Ingols, K., Chu, M., Lippmann, R., Webster, S., and Boyer,
S. (2009). Modeling modern network attacks and
countermeasures using attack graphs. In Computer
Security Applications Conference, 2009. ACSAC’09.
Annual, pages 117–126. IEEE.
Johnson, P., Lagerstr
¨
om, R., and Ekstedt, M. (2018). A
meta language for threat modeling and attack simu-
lations. In Proceedings of the 13th International
Conference on Availability, Reliability and Security,
page 38. ACM.
J
¨
urjens, J. (2005). Secure systems development with UML.
Springer Science & Business Media.
Kleberger, P., Olovsson, T., and Jonsson, E. (2011). Se-
curity aspects of the in-vehicle network in the con-
nected car. In 2011 IEEE Intelligent Vehicles Sympo-
sium (IV), pages 528–533.
Kordy, B., Mauw, S., Radomirovi
´
c, S., and Schweitzer, P.
(2010). Foundations of attack–defense trees. In Inter-
national Workshop on Formal Aspects in Security and
Trust, pages 80–95. Springer.
Kordy, B., Pi
`
etre-Cambac
´
ed
`
es, L., and Schweitzer, P.
(2014). Dag-based attack and defense modeling:
Don’t miss the forest for the attack trees. Computer
science review, 13:1–38.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., and Savage, S. (2010). Experimental
security analysis of a modern automobile. In 2010
IEEE Symposium on Security and Privacy, pages 447–
462.
Kraftfahrt-Bundesamt (2018). Bestand in den
jahren 1960 bis 2018 nach fahrzeugklassen.
https://www.kba.de/DE/Statistik/Fahrzeuge/Bestand/
FahrzeugklassenAufbauarten/b fzkl zeitreihe.html.
[Online; accessed 28-March-2018].
Mauw, S. and Oostdijk, M. (2005). Foundations of attack
trees. In International Conference on Information Se-
curity and Cryptology, pages 186–198. Springer.
Mundhenk, P., Steinhorst, S., Lukasiewycz, M., Fahmy,
S. A., and Chakraborty, S. (2015). Security analysis
of automotive architectures using probabilistic model
checking. In Proceedings of the 52Nd Annual Design
Automation Conference, DAC ’15, pages 38:1–38:6,
New York, NY, USA. ACM.
Newman, R. C. (2009). Computer security: Protecting di-
gital resources. Jones & Bartlett Publishers.
Noel, S., Elder, M., Jajodia, S., Kalapa, P., O’Hare, S.,
and Prole, K. (2009). Advances in topological vul-
nerability analysis. In Conference For Homeland Se-
curity, 2009. CATCH ’09. Cybersecurity Applications
Technology, pages 124–129.
Paja, E., Dalpiaz, F., and Giorgini, P. (2015). Modelling
and reasoning about security requirements in socio-
technical systems. Data & Knowledge Engineering,
98:123–143.
Peffers, K., Tuunanen, T., Rothenberger, M. A., and Chat-
terjee, S. (2007). A Design Science Research Metho-
dology for Information Systems Research. Journal of
Management Information Systems, 24(3):45–77.
Rippel, E. (2008). Embedded security challenges in auto-
motive designs. In Proc. Workshop on Embedded Se-
curity in Cars (escar 2008).
Schneier, B. (1999). Attack trees. Dr. Dobb’s journal,
24(12):21–29.
Schneier, S. (2000). Lies: digital security in a networked
world. New York, John Wiley & Sons, 21:318–333.
Smith, C. (2016). The Car Hacker’s Handbook: A Guide
for the Penetration Tester. No Starch Press.
Sommestad, T., Holm, H., and Ekstedt, M. (2012). Estima-
tes of success rates of remote arbitrary code execution
attacks. Information Management & Computer Secu-
rity, 20(2):107–122.
Statistiska centralbyr
˚
an (2018). Fordonssta-
tistik januari 2006–februari 2018. http:
//www.scb.se/hitta-statistik/statistik-efter-amne/
transporter-och-kommunikationer/vagtrafik/
fordonsstatistik/pong/tabell-och-diagram/
fordonsstatistik/. [Online; accessed 28-March-
2018].
Sung, G.-N., Juan, C.-Y., and Wang, C.-C. (2008). Bus
guardian design for automobile networking ecu nodes
compliant with flexray standards. In 2008 IEEE Inter-
national Symposium on Consumer Electronics, pages
1–4.
Symantec (2017). Internet security threat report.
https://www.symantec.com/content/dam/symantec/
docs/reports/istr-22-2017-en.pdf. [Online; accessed
28-March-2018].
Takahashi, J., Aragane, Y., Miyazawa, T., Fuji, H., Ya-
mashita, H., Hayakawa, K., Ukai, S., and Hayakawa,
H. (2017). Automotive attacks and countermeasu-
res on lin-bus. Journal of Information Processing,
25:220–228.
Webster, J. and Watson, R. T. (2002). Analyzing the past
to prepare for the future: Writing a literature review.
MIS Quarterly, 26(2):xiii–xxiii.
Williams, L., Lippmann, R., and Ingols, K. (2008). GAR-
NET: A graphical attack graph and reachability net-
work evaluation tool. Springer.
Wolf, M. (2009). Security engineering for vehicular IT sys-
tems—improving trustworthiness and dependability of
automotive IT applications. Vieweg + Teubner.
Wolf, M., Weimerskirch, A., and Paar, C. (2004). Secu-
rity in automotive bus systems. In Proceedings of the
Workshop on Embedded Security in Cars.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
182