Top Banner
KTH ROYAL INSTITUTE OF TECHNOLOGY Threat Modeling and Simulation for Automotive IT Associate prof. Robert Lagerström
16

Threat Modeling and Simulation for Automotive IT

Feb 17, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Threat Modeling and Simulation for Automotive IT

KTH ROYAL INSTITUTE OF TECHNOLOGY

Threat Modeling and Simulation for Automotive IT Associate prof. Robert Lagerström

Page 2: Threat Modeling and Simulation for Automotive IT

Contact

Robert Lagerström [email protected] 073-67 67 257 www.kth.se/profile/robertl www.foreseeti.com

Page 3: Threat Modeling and Simulation for Automotive IT

Partners

KTH Royal Institute of Technology -  Software System Architecture and Security group, School

of Electrical Engineering

Foreseeti AB -  KTH spin-off -  securiCAD®, a threat modeling and risk management tool

Scania - End-users, R&D

Page 4: Threat Modeling and Simulation for Automotive IT

Pre-study

Pre-study just started Requirements specification for a threat modeling and analysis language for vehicle ICT security Project application in June 1)  Find the attack paths available for cyber threats in

modern connected vehicles 2)  Collect information required to estimate the difficulty of

attack success 3)  Design an efficient and accurate modeling language for

digital attack simulations

Page 5: Threat Modeling and Simulation for Automotive IT

Why am I here today?

1) Looking for new partners 2) Project scope can change somewhat with new partners

Page 6: Threat Modeling and Simulation for Automotive IT

securiCAD® in a nutshell

Probability Mathematics 10 years of research

Page 7: Threat Modeling and Simulation for Automotive IT

securiCAD® in a nutshell

Model IT / OT environment Simulate attacks Analyze & Manage

Page 8: Threat Modeling and Simulation for Automotive IT

8

Screenshot from new GUI

Page 9: Threat Modeling and Simulation for Automotive IT

9

Screenshot from new GUI OBJECTS

Page 10: Threat Modeling and Simulation for Automotive IT

10

Screenshot from new GUI ATTACK STEPS

Page 11: Threat Modeling and Simulation for Automotive IT

11

DEFENSES

Page 12: Threat Modeling and Simulation for Automotive IT

12

Screenshot from new GUI ATTACK PATHS

Page 13: Threat Modeling and Simulation for Automotive IT

13

Screenshot from new GUI ATTACK DISTRIBUTION

Page 14: Threat Modeling and Simulation for Automotive IT

14

Under the hood - the complete attack tree

Page 15: Threat Modeling and Simulation for Automotive IT

15

Risk

Page 16: Threat Modeling and Simulation for Automotive IT

securiCAD support to security processes Strategic

Design support / design comparison Risk managment Risk audit and compliance (Asset managment) …

Tactic Risk montoring and control (Prioritize) penetration testing …

Operation Intrusion detection Incident resonse …

Forensics Incident analysis …