Assumptions of ECU capabilities can impact the
future mapping between tools and ECUs.
Furthermore, the same tools can be used for different
types of functionality and in connection to different
components. While the structure of the approach
would remain the same, it is the tailoring of a specific
system that might require inputs from experts.
This paper illustrated the approach, but didn’t go
into interdependencies of tools and testing
infrastructures. Ensuring proportionality of tests,
tools, and test outcomes is a subject for future
research. Future mapping and applying will provide
further insights on their appropriateness and
sequences of their use. Test dependencies is another
topic for future investigation.
The illustrated list of tools is not exhaustive,
rigorously constructed, or undisputable linked to the
high-level functionality. To scope the list, we focused
on technologies relevant to connected vehicles. The
mentioned tools were identified based on their
relevance to automated security testing, adversary
emulation, vulnerability assessments, attack
simulations, and identifying threats, such as threat
management tools and attack trees. Yet, this is
borrowed significantly from network and web testing.
Future research could focus on more comprehensive
studying how these and other tools can be used to
devise advanced strategies of testing and simulated
adversary activities.
ACKNOWLEDGEMENTS
The research is carried out as part of the SECREDAS
project, which is co-funded by the ECSEL Joint
Undertaking of the European Union under grant
agreement number 783119 and the Netherlands
Organization for Applied Scientific Research TNO.
REFERENCES
Applebaum, A., D. Miller, B. Strom, H. Foster, and C.
Thomas, 2017, “Analysis of automated adversary
emulation techniques.” In Proceedings of the Summer
Simulation Multi-Conference (p. 16). Society for
Computer Simulation International, July 2017.
Arkin, B., S. Stender, and G. McGraw, 2005. “Software
penetration testing. Security & Privacy, IEEE, 3(1): 84-
87.
Assante M.J. and L.M. Lee, 2015, “The industrial control
system cyber kill chain”. SANS Institute InfoSec
Reading Room, 1
Cheah, M., S.A. Shaikh, J. Bryans, and P. Wooderson,
2018, “Building an automotive security assurance case
using systematic security evaluations,” Computers &
Security, 77, pp. 360-379.
Felderer, M., M. Büchler, J. Martin, A. Brucker, R. Breu,
and A. Pretschner, 2015, “Security Testing: A Survey”,
10.1016/bs.adcom.2015.11.003.
IBS, 2015, “International Business Times. Hackers disable
Corvette brakes by texting dongle meant to lower
insurance risk”, http://www.ibtimes.co.uk/hackers-
disablecorvette-brakes-by-texting-dongle-meant-
lower-insurance-risk-15151253, Last accessed on Dec
20, 2019.
IBS, 2016, “Hacker takes control of Nissan electric vehicle
from other side of the world through Leaf app”,
http://www.ibtimes.co.uk/hacker-takes-control-nissan-
electric-vehicle-otherside-world-through-leaf-app-
1545808. Last Accessed on Dec 20, 2019.
Miller, D., R. Alford, A. Applebaum, H. Foster, C. Little,
and B. Strom, 2018, “Automated adversary emulation:
A case for planning and acting with unknowns,” 2018.
Ming L. et al., 2018, "A General Testing Framework Based
on Veins for Securing VANET Applications," IEEE
SmartWorld, Guangzhou, pp. 2068-2073.
Mouratidis H. and P. Giorgini, 2007, “Security Attack
Testing (SAT)—testing the security of information
systems at design time”. Information Systems. 32.
1166-1183. 10.1016/j.is.2007.03.002
ProfessionalQA, 2019, “Penetration Testing Tools: Top
55”, July 16, http://www.professionalqa.com/
penetration-testing-tools. Last accessed on Dec 20,
2019.
Samant, N., 2011, “Automated penetration testing”
Software Testing Help website, 2019, “19 Powerful
Penetration Testing Tools In 2020 (Security Testing
Tools)”, Dec 14, https://www.softwaretestinghelp.com/
penetration-testing-tools/. Last accessed on Dec 20,
2019.
Strom, B.E., J.A. Battaglia, M.S. Kemmerer, W.
Kupersanin, D. Miller, C. Wampler, et al. 2017,
“Finding cyber threats with ATT&CK-based
analytics,” Technical Report MTR170202, MITRE.
Wallingford, J., M. Peshwa, and D. Kelly, 2019, “Towards
Understanding the Value of Ethical Hacking. In
International Conference on Cyber Warfare and
Security”, pp. 639-XIV. Academic Conferences
International Limited.
Wired, 2015, “GM Took 5 Years to Fix a Full-Takeover
Hack in Millions of OnStar Cars”,
https://www.wired.com/2015/09/gm-took-5-years-fix-
full-takeover-hack-millions-onstar-cars/#. Last
accessed on Dec 20, 2019.