Karahasanovic, A., Kleberger, P., and Almgren, M. (2017).
Adapting threat modeling methods for the automotive
industry. In Proceedings of the 15th ESCAR Confer-
ence, pages 1–10. Chalmers Publication Library.
Kordy, B., Mauw, S., Radomirovi
´
c, S., and Schweitzer, P.
(2010). Foundations of attack–defense trees. In Inter-
national Workshop on Formal Aspects in Security and
Trust, pages 80–95. Springer.
Korman, M., Lagerstr
¨
om, R., V
¨
alja, M., Ekstedt, M., and
Blom, R. (2016). Technology management through
architecture reference models: A smart metering
case. In Management of Engineering and Technol-
ogy (PICMET), 2016 Portland International Confer-
ence on, pages 2338–2350. IEEE.
Korman, M., V
¨
alja, M., Bj
¨
orkman, G., Ekstedt, M., Ver-
notte, A., and Lagerstr
¨
om, R. (2017). Analyzing the
effectiveness of attack countermeasures in a scada sys-
tem. In Proceedings of the 2nd Workshop on Cyber-
Physical Security and Resilience in Smart Grids,
pages 73–78. ACM.
Lagerstr
¨
om, R., Baldwin, C., MacCormack, A., Sturtevant,
D., and Doolan, L. (2017a). Exploring the relationship
between architecture coupling and software vulnera-
bilities. In International Symposium on Engineering
Secure Software and Systems, pages 53–69. Springer.
Lagerstr
¨
om, R., Franke, U., Johnson, P., and Ullberg, J.
(2009). A method for creating entreprise architecture
metamodels: applied to systems modifiability. Inter-
national Journal of Computer Science and Applica-
tions, 6(5):89–120.
Lagerstr
¨
om, R., Johnson, P., and Ekstedt, M. (2017b). Au-
tomatic design of secure enterprise architecture: Work
in progress paper. In Enterprise Distributed Object
Computing Workshop (EDOCW), 2017 IEEE 21st In-
ternational, pages 65–70. IEEE.
Ma, Z. and Schmittner, C. (2016). Threat modeling for auto-
motive security analysis. Advanced Science and Tech-
nology Letters, 139:333–339.
Miller, C. and Valasek, C. (2014). A survey of remote auto-
motive attack surfaces. BlackHat USA.
Miller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle. BlackHat USA.
N
¨
arman, P., Johnson, P., Lagerstr
¨
om, R., Franke, U., and
Ekstedt, M. (2009). Data collection prioritization for
system quality analysis. Electronic Notes in Theoreti-
cal Computer Science, 233:29–42.
Noorman, J., Agten, P., Daniels, W., Strackx, R., Her-
rewege, A. V., Huygens, C., Preneel, B., Ver-
bauwhede, I., and Piessens, F. (2013). Sancus: Low-
cost trustworthy extensible networked devices with a
zero-software trusted computing base. pages 479–
498. USENIX.
Noorman, J., Van Bulck, J., M
¨
uhlberg, J. T., Piessens, F.,
Maene, P., Preneel, B., Verbauwhede, I., G
¨
otzfried, J.,
M
¨
uller, T., and Freiling, F. (2017). Sancus 2.0: A low-
cost security architecture for iot devices. ACM Trans-
actions on Privacy and Security (TOPS), 20(3):1–33.
Ou, X., Boyer, W. F., and McQueen, M. A. (2006). A scal-
able approach to attack graph generation. In Proceed-
ings of the 13th ACM conference on Computer and
communications security, pages 336–345. ACM.
Park, J. S., Kim, D., Hong, S., Lee, H., and Myeong, E.
(2018). Case study for defining security goals and re-
quirements for automotive security parts using threat
modeling. In SAE Technical Paper. SAE International.
Saini, V., Duan, Q., and Paruchuri, V. (2008). Threat model-
ing using attack trees. Journal of Computing Sciences
in Colleges, 23(4):124–131.
Salfer, M. and Eckert, C. (2018). Attack graph-based
assessment of exploitability risks in automotive on-
board networks. In Proceedings of the 13th Interna-
tional Conference on Availability, Reliability and Se-
curity, pages 1–10. ACM.
Salter, C., Saydjari, O. S. S., Schneier, B., and Wallner, J.
(1998). Toward a secure system engineering method-
ology. In Proceedings of the 1998 workshop on New
security paradigms, pages 2–10. ACM.
Schweppe, H. (2012). Security and privacy in automotive
on-board networks. PhD thesis, T
´
el
´
ecom ParisTech.
Shostack, A. (2014). Threat modeling: Designing for secu-
rity. John Wiley & Sons.
Symeonidis, I., Abdelrahaman, A., Mustafa Asan, M., Men-
nink, B., Dhooghe, S., and Preneel, B. (2017). Sep-
car: A secure and privacy-enhancing protocol for car
access provision. In ESORICS 2017: Computer Secu-
rity - ESORICS 2017, pages 475–493. Springer.
V
¨
alja, M., Korman, M., and Lagerstr
¨
om, R. (2017). A study
on software vulnerabilities and weaknesses of embed-
ded systems in power networks. In Proceedings of
the 2nd Workshop on Cyber-Physical Security and Re-
silience in Smart Grids, pages 47–52. ACM.
V
¨
alja, M., Lagerstr
¨
om, R., Ekstedt, M., and Korman, M.
(2015). A requirements based approach for automat-
ing enterprise it architecture modeling using multiple
data sources. In Enterprise Distributed Object Com-
puting Workshop (EDOCW), 2015 IEEE 19th Interna-
tional, pages 79–87. IEEE.
Van Bulck, J., M
¨
uhlberg, T., and Piessens, F. (2017). Vul-
can: Efficient component authentication and software
isolation for automotive control networks. pages 225–
237. ACM International Conference Proceeding Se-
ries.
Vernotte, A., Johnson, P., Ekstedt, M., and Lagerstr
¨
om,
R. (2017). In-depth modeling of the unix operating
system for architectural cyber security analysis. In
Enterprise Distributed Object Computing Workshop
(EDOCW), 2017 IEEE 21st International, pages 127–
136. IEEE.
Vernotte, A., V
¨
alja, M., Korman, M., Bj
¨
orkman, G., Ekst-
edt, M., and Lagerstr
¨
om, R. (2018). Load balancing of
renewable energy: a cyber security analysis. Energy
Informatics, 1(1):5.
Williams, I. and Yuan, X. (2015). Evaluating the effective-
ness of microsoft threat modeling tool. In Proceedings
of the 2015 Information Security Curriculum Devel-
opment Conference, page 9. ACM.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
486