functional safety, could provide a useful mechanism
for both recording and maintaining cybersecurity
assurance claims. This paper has identified a number
of essential requirements for a cybersecurity case for
automotive applications, and differences from safety
cases, as well as a range of particular challenges that
will need to be overcome in future, for both safety and
cybersecurity applications.
ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Union’s Horizon 2020
research and innovation programme under the Marie
Skłodowska-Curie grant agreement No 812788
(MSCA-ETN SAS – Safer Autonomous Systems).
This publication reflects only the authors’ view,
exempting the European Union from any liability.
Project website: http://etn-sas.eu/.
REFERENCES
Armstrong, R., Hawkins, R. & Kelly, T. (2011). Security
Assurance Cases: Motivation and the State of the Art.
University of York Report CESG/TR/2011/1, April 2011
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.
1.221.456&rep=rep1&type=pdf.
Cui, J., Liew, L. S., Sabaliauskaite, G., & Zhou, F. (2018).
A review on safety failures, security attacks, and
available countermeasures for autonomous vehicles. Ad
Hoc Networks, 90 (December 2018), 101823. https://
doi.org/10.1016/j.adhoc.2018.12.006.
Cui, J., Sabaliauskaite, G., Liew, L. S., Zhou, F., & Zhang,
B. (2019). Collaborative Analysis Framework of Safety
and Security for Autonomous Vehicles. IEEE Access,
7 (March 2018), 148672–148683. https://doi.org/
10.1109/ACCESS.2019.2946632.
Giannakopoulou, D., Pressburger, T., Mavridou, A., &
Schumann, J. (2020). Generation of Formal
Requirements from Structured Natural Language. In N.
Madhavji, L. Pasquale, A. Ferrari, & S. Gnesi (Eds.),
Requirements Engineering: Foundation for Software
Quality (pp. 19–35). Springer International Publishing.
https://doi.org/10.1007/978-3-030-44429-7_2.
Kelly, T., & Weaver, R. (2004). The Goal Structuring
Notation – A Safety Argument Notation. Elements.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.
1.1.66.5597&rep=rep1&type=pdf.
Kelly, T. P., McDermid, J., & Weaver, R. (2005). “Goal-
Based Safety Standards: Opportunities and Challenges”,
Proceedings of the 23rd International System Safety
Conf., San Diego, California (August 2005). https:/
/www-users.cs.york.ac.uk/~tpk/ISSC23.pdf.
Leveson, N. (2011). The Use of Safety Cases in
Certification and Regulation. MIT-ESD Working Paper
Series November 2011, 1–12. https://dspace
.mit.edu/bitstream/handle/1721.1/102833/esd-wp-2011
-13.pdf?sequence=1&isAllowed=y.
Macher, G., Messnarz, R., Armengaud, E., Riel, A.,
Brenner, E., & Kreiner, C. (2017). Integrated Safety and
Security Development in the Automotive Domain. SAE
Technical Papers, March 2017. https://doi.org/10.
4271/2017-01-1661.
Ruddle, A.R., et al., (2020). Requirements and timescales
for CYB-R: the UK Centre of excellence for road
transport cybersecurity resilience, ResiCAV Project
Deliverable 1, 30th March 2020. https://zenzic.io/
reports-and-resources/
Ruddle, A.R., & Ward, D.D. (2016). “Cyber Security Risk
Analysis for Intelligent Transport Systems and In-
vehicle Networks”, in A. Perallos, U. Hernandez-Jayo,
E. Onieva and I. Garcia (Eds.) Intelligent Transport
Systems: Technologies and Applications, Chapter 5,
Wiley-Blackwell, 2016, pp. 83–106. https://doi.org/
10.1002/9781118894774.ch5.
Shavit, M., Gryc, A., & Miucic, R. (2007). Firmware update
over the Air (FOTA) for automotive industry. SAE
Technical Papers, 724. https://doi.org/10.4271/2007-
01-3523.
Steger, M., Dorri, A., Kanhere, S. S., Römer, K., Jurdak, R.,
& Karner, M. (2018). Secure Wireless Automotive
Software Updates Using Blockchains: A Proof of
Concept. 137–149. https://doi.org/10.1007/978-3-319-
66972-4_12.
Tanguy, L., Tulechki, N., Urieli, A., Hermann, E., &
Raynal, C. (2016). Natural language processing for
aviation safety reports: From classification to
interactive analysis. Computers in Industry, 78, 80–95.
https://doi.org/10.1016/j.compind.2015.09.005.
Toulmin, S. (1958). The Uses of Argument Cambridge
University Press. doi:10.1017/CBO9780511840005.
Wang, P., Di, B., Zhang, H., Bian, K., & Song, L. (2018).
Cellular V2X Communications in Unlicensed
Spectrum: Harmonious Coexistence with VANET in
5G Systems. IEEE Transactions on Wireless
Communications, 17(8), 5212–5224. https://doi.org/
10.1109/TWC.2018.2839183.
Ward, D., Ibarra, I., & Ruddle, A. (2013). Threat Analysis
and Risk Assessment in Automotive Cyber Security.
SAE International Journal of Passenger Cars -
Electronic and Electrical Systems, 6(2), 507–513.
https://doi.org/10.4271/2013-01-1415.
Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles
633