STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System
Abstract
:1. Introduction
2. Methodology
2.1. Use Case Scenario
2.2. Proposed System Components
2.3. DFD
3. Threat and Risk Assessment Methodologies
3.1. Threat Modeling Tools
3.1.1. PASTA
3.1.2. Attack Tree
3.1.3. CVSS
3.1.4. OCTAVE
3.1.5. VAST
3.1.6. LINDDUN
3.1.7. STRIDE
3.2. Risk Assessment Methodologies
3.2.1. FMVEA
3.2.2. SHIELD
3.2.3. CHASSIS
3.2.4. HEAVENS
3.2.5. EVITA
3.2.6. SAHARA
3.2.7. DREAD
- Damage (D): Signifying the potential impact of an attack.
- Reproducibility (R): Indicating the ease of replicating the attack.
- Exploitability (E): Assessing the effort required to execute the attack.
- Affected Users (A): The number of individuals who are going to experience the impact.
- Discoverability (D): Measuring the ease of identifying the threat.
4. Evaluation of Threats and Risk Rating
4.1. Analyzing Threats
4.2. Identified Threats
4.3. Rating Threats
5. Results and Discussion
5.1. Resultant Threats and Risks
5.2. Generalized Defense Mechanisms against STRIDE
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Watabe, H.; Yamada, H. Efforts toward realization of connected car society. Denso Ten Tech. Rev. 2017, 1, 3–11. [Google Scholar]
- Hackers Take Remote Control of Tesla’s Brakes and Door Locks from 12 Miles Away. Available online: https://thehackernews.com/2016/09/hack-tesla-autopilot.html (accessed on 9 June 2023).
- Vehicle Cybersecurity: The Jeep Hack and Beyond. Available online: https://insights.sei.cmu.edu/blog/vehicle-cybersecurity-the-jeep-hack-and-beyond (accessed on 10 June 2023).
- Choi, J.; Jin, S.I. Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism. In Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2018 12; Springer: Singapore, 2019; pp. 383–388. [Google Scholar]
- Takahashi, J.; Iwamura, M.; Tanaka, M. Security threat analysis of automotive infotainment systems. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Virtual, 18 November–16 December 2020; pp. 1–7. [Google Scholar]
- Nie, S.; Liu, L.; Du, Y. Free-fall: Hacking tesla from wireless to can bus. Brief. Black Hat USA 2017, 25, 16. [Google Scholar]
- Kamkar, S. Drive it like you hacked it: New attacks and tools to wirelessly steal cars. Present. Defcon 2015, 23, 10. [Google Scholar]
- Keuper, D.; Alkemade, T. The Connected Car-Ways to Get Unauthorized Access and Potential Implications; Research Paper; Computest: Zoetermeer, The Netherlands, 2018. [Google Scholar]
- Smith, C. The Car Hacker’s Handbook: A Guide for the Penetration Tester; No Starch Press: San Francisco, CA, USA, 2016. [Google Scholar]
- Bolz, R.; Kriesten, R. Automotive vulnerability disclosure: Stakeholders, opportunities, challenges. J. Cybersecur. Priv. 2021, 1, 274–288. [Google Scholar] [CrossRef]
- Renganathan, V.; Yurtsever, E.; Ahmed, Q.; Yener, A. Valet attack on privacy: A cybersecurity threat in automotive Bluetooth infotainment systems. Cybersecurity 2022, 5, 30. [Google Scholar] [CrossRef]
- Moiz, A.; Alalfi, M.H. An approach for the identification of information leakage in automotive infotainment systems. In Proceedings of the 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM), Adelaide, Australia, 28 September–2 October 2020; pp. 110–114. [Google Scholar]
- Scalas, M.; Giacinto, G. Automotive cybersecurity: Foundations for next-generation vehicles. In Proceedings of the 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), Amman, Jordan, 9–11 October 2019; pp. 1–6. [Google Scholar]
- Iorio, M.; Reineri, M.; Risso, F.; Sisto, R.; Valenza, F. Securing SOME/IP for in-vehicle service protection. IEEE Trans. Veh. Technol. 2020, 69, 13450–13466. [Google Scholar] [CrossRef]
- Yang, Y.; Duan, Z.; Tehranipoor, M. Identify a spoofing attack on an in-vehicle CAN bus based on the deep features of an ECU fingerprint signal. Smart Cities 2020, 3, 17–30. [Google Scholar] [CrossRef]
- Koscher, K.; Czeskis, A.; Roesner, F.; Patel, S.; Kohno, T.; Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; et al. Experimental security analysis of a modern automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, Berleley/Oakland, CA, USA, 16–19 May 2010; pp. 447–462. [Google Scholar]
- Dang, Q.A.; Khondoker, R.; Wong, K.; Kamijo, S. Threat analysis of an autonomous vehicle architecture. In Proceedings of the 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh, 19–20 December 2020; pp. 1–6. [Google Scholar]
- Pascale, F.; Adinolfi, E.A.; Coppola, S.; Santonicola, E. Cybersecurity in automotive: An intrusion detection system in connected vehicles. Electronics 2021, 10, 1765. [Google Scholar] [CrossRef]
- Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. STRIDE-based threat modeling for cyber-physical systems. In Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Torino, Italy, 26–29 September 2017; pp. 1–6. [Google Scholar]
- Benyahya, M.; Lenard, T.; Collen, A.; Nijdam, N.A. A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; pp. 1–10. [Google Scholar]
- Al Asif, M.R.; Hasan, K.F.; Islam, M.Z.; Khondoker, R. STRIDE-based cyber security threat modeling for IoT-enabled precision agriculture systems. In Proceedings of the 2021 3rd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh, 18–19 December 2021; pp. 1–6. [Google Scholar]
- Salau, A.; Dantu, R.; Morozov, K.; Upadhyay, K.; Badruddoja, S. Towards a threat model and security analysis for data cooperatives. In Proceedings of the 19th International Conference on Security and Cryptography-SECRYPT, Lisbon, Portugal, 11–13 July 2022; pp. 707–713. [Google Scholar]
- Shostack, A. Threat Modeling: Designing for Security; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
- Alarcón, J.; Balcázar, I.; Collazos, C.A.; Luna, H.; Moreira, F. User interface design patterns for infotainment systems based on driver distraction: A Colombian case study. Sustainability 2022, 14, 8186. [Google Scholar] [CrossRef]
- Quintal, F.; Lima, M. HapWheel: In-car infotainment system feedback using haptic and hovering techniques. IEEE Trans. Haptics 2021, 15, 121–130. [Google Scholar] [CrossRef] [PubMed]
- Designing Infotainment Systems That Are Interactive, Not Distractive. Automotive Technical Articles—TI E2E Support Forums, 6 June 2019. Available online: https://e2e.ti.com/blog_/b/behind_the_wheel/posts/designing-infotainment-systems-that-are-interactive-not-distractive (accessed on 12 August 2023).
- Designing in-Vehicle Infotainment Systems. Available online: https://my.avnet.com/abacus/solutions/markets/automotive-and-transportation/automotive/comfort-infotainment-and-safety/automotive-infotainment/ (accessed on 12 April 2024).
- Meixner, G.; Häcker, C.; Decker, B.; Gerlach, S.; Hess, A.; Holl, K.; Klaus, A.; Lüddecke, D.; Mauser, D.; Orfgen, M.; et al. Retrospective and future automotive infotainment systems—100 years of user interface evolution. In Automotive User Interfaces: Creating Interactive Experiences in the Car; Springer: Berlin/Heidelberg, Germany, 2017; pp. 3–53. [Google Scholar]
- Berger, M.; Bernhaupt, R.; Pfleging, B. A tactile interaction concept for in-car passenger infotainment systems. In Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications: Adjunct Proceedings, Utrecht, The Netherlands, 22–25 September 2019; pp. 109–114. [Google Scholar]
- Sen, G.; Sener, B. Design for luxury front-seat passenger infotainment systems with experience prototyping through VR. Int. J. Hum.–Comput. Interact. 2020, 36, 1714–1733. [Google Scholar] [CrossRef]
- Josephlal, E.F.M.; Adepu, S. Vulnerability Analysis of an Automotive Infotainment System’s WIFI Capability. In Proceedings of the 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), Hangzhou, China, 3–5 January 2019; pp. 241–246. [Google Scholar]
- Tashev, I.; Seltzer, M.; Ju, Y.C.; Wang, Y.Y.; Acero, A. Commute UX: Voice Enabled In-Car Infotainment System. In Proceedings of the Mobile HCI’09: Workshop on Speech in Mobile and Pervasive Environments (SiMPE), Bonn, Germany, 15–18 September 2009; Available online: https://www.microsoft.com/en-us/research/publication/commute-ux-voice-enabled-in-car-infotainment-system/ (accessed on 5 June 2023).
- Souppaya, M.; Scarfone, K. Guide to enterprise telework, remote access, and bring your own device (BYOD) security. NIST Spec. Publ. 2016, 800, 46. [Google Scholar]
- UcedaVelez, T.; Morana, M.M. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis; John Wiley & Sons: Hoboken, NJ, USA, 2015. [Google Scholar]
- Shevchenko, N.; Chick, T.A.; O’Riordan, P.; Scanlon, T.P.; Woody, C. Threat Modeling: A Summary of Available Methods; Carnegie Mellon University Software Engineering Institute Pittsburgh United States: Pittsburgh, PA, USA, 2018. [Google Scholar]
- Schneier, B. Attack trees. Dr Dobb’s J. 1999, 24, 21–29. [Google Scholar]
- Noel, S.; Jajodia, S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, 29 October 2004; pp. 109–118. [Google Scholar]
- Mauw, S.; Oostdijk, M. Foundations of attack trees. In Proceedings of the Information Security and Cryptology-ICISC 2005: 8th International Conference, Seoul, Republic of Korea, 1–2 December 2005; Springer: Berlin/Heidelberg, Germany, 2015; pp. 186–198. [Google Scholar]
- Wang, P.; Lin, W.H.; Kuo, P.T.; Lin, H.T.; Wang, T.C. Threat risk analysis for cloud security based on attack-defense trees. In Proceedings of the 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), Seoul, Republic of Korea, 24–26 April 2012; Volume 1, pp. 106–111. [Google Scholar]
- Common Vulnerability Scoring System v3.0: Specification Document. Forum of Incident Response and Security Teams. Available online: https://www.first.org/cvss/specification-document (accessed on 25 July 2023).
- Potteiger, B.; Martins, G.; Koutsoukos, X. Software and attack centric integrated threat modeling for quantitative risk assessment. In Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, 19–21 April 2016; pp. 99–108. [Google Scholar]
- Caralli, R.A.; Stevens, J.F.; Young, L.R.; Wilson, W.R. Introducing Octave Allegro: Improving the Information Security Risk Assessment Process; Carnegie Mellon University, Software Engineering Institute’s Digital Library: Hansom AFB, MA, USA, 2007. [Google Scholar]
- Mead, N.R.; Shull, F.; Vemuru, K.; Villadsen, O. A Hybrid Threat Modeling Method; Technical Report-CMU/SEI-2018-TN-002; Carnegie Mellon University-Software Engineering Institute: Pittsburgh, PA, USA, 2018. [Google Scholar]
- Selin, J. Evaluation of Threat Modeling Methodologies. Master’s Thesis, Jamk University of Applied Sciences, Jyväskylä, Finland, 2019. Available online: https://www.theseus.fi/bitstream/handle/10024/220967/Selin_Juuso.pdf (accessed on 1 June 2024).
- Kim, K.H.; Kim, K.; Kim, H.K. STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery. ETRI J. 2022, 44, 991–1003. [Google Scholar] [CrossRef]
- Tany, N.S.; Suresh, S.; Sinha, D.N.; Shinde, C.; Stolojescu-Crisan, C.; Khondoker, R. Cybersecurity Comparison of Brain-Based Automotive Electrical and Electronic Architectures. Information 2022, 13, 518. [Google Scholar] [CrossRef]
- Asif, M.R.A.; Khondoker, R. Cyber Security Threat Modeling of A Telesurgery System. In Proceedings of the 2020 2nd International Conference on Sustainable Technologies for Industry, Dhaka, Bangladesh, 19–20 December 2020; Volume 4, pp. 1–6. [Google Scholar]
- Schiffman, M.; Wright, A.; Ahmad, D.; Eschelbeck, G. The Common Vulnerability Scoring System; National Infrastructure Advisory Council, Vulnerability Disclosure Working Group, Vulnerability Scoring: Washington, DC, USA, 2004. [Google Scholar]
- Alberts, C.; Dorofee, A.; Stevens, J.; Woody, C. Introduction to the OCTAVE Approach; Carnegie Mellon University: Pittsburgh, PA, USA, 2003; pp. 72–74. [Google Scholar]
- Beyst, B. Which Threat Modeling Method. Available online: https://threatmodeler.com/threat-modeling-methodologies-vast/ (accessed on 9 June 2024).
- Wuyts, K.; Joosen, W. LINDDUN Privacy threat Modeling: A Tutorial; CW Reports; KU Leuven: Leuven, Belgium, 2015. [Google Scholar]
- Swiderski, F.; Snyder, W. Threat Modeling; Microsoft Press: Redmond, WA, USA, 2004. [Google Scholar]
- AbuEmera, E.A.; ElZouka, H.A.; Saad, A.A. Security framework for identifying threats in smart manufacturing systems using STRIDE approach. In Proceedings of the 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China, 14–16 January 2022; pp. 605–612. [Google Scholar]
- Khan, A.; Bryans, J.; Sabaliauskaite, G. Framework for calculating residual cybersecurity risk of threats to road vehicles in alignment with ISO/SAE 21434. In Proceedings of the International Conference on Applied Cryptography and Network Security, Rome, Italy, 20–23 June 2022; Springer International Publishing: Cham, Switzerland, 2022; pp. 235–247. [Google Scholar]
- Birch, J.; Rivett, R.; Habli, I.; Bradshaw, B.; Botham, J.; Higham, D.; Jesty, P.; Monkhouse, H.; Palin, R. Safety cases and their role in ISO 26262 functional safety assessment. In Proceedings of the Computer Safety, Reliability, and Security: 32nd International Conference, SAFECOMP 2013, Toulouse, France, 14–27 September 2013; Proceedings 32; Springer: Berlin/Heidelberg, Germany, 2013; pp. 154–165. [Google Scholar]
- Dempsey, K.L.; Johnson, L.A.; Scholl, M.A.; Stine, K.M.; Jones, A.C.; Orebaugh, A.; Chawla, N.S.; Johnston, R. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations; CreateSpace Independent Publishing Platform: Scotts Valley, CA, USA, 2011. [Google Scholar]
- Grassi, P.A.; Fenton, J.L.; Garcia, M.E. Digital Identity Guidelines [Including Updates as of 12-01-2017]. 2017. Available online: https://www.nist.gov/publications/digital-identity-guidelines-including-updates-12-01-2017 (accessed on 25 July 2023).
- IEC 60812; Analysis Techniques for System Reliability—Procedure for Failure Mode and Effects Analysis (FMEA). ISO—International Organization for Standardization: Geneva, Switzerland, 2006.
- Schmittner, C.; Gruber, T.; Puschner, P.; Schoitsch, E. Security application of failure mode and effect analysis (FMEA). In Computer Safety, Reliability, and Security: Proceedings of the 33rd International Conference, SAFECOMP 2014, Florence, Italy, 10–14 September 2014; Springer International Publishing: Berlin/Heidelberg, Germany, 2014; pp. 310–325. [Google Scholar]
- Macher, G.; Armengaud, E.; Brenner, E.; Kreiner, C. A review of threat analysis and risk assessment methods in the automotive context. In Computer Safety, Reliability, and Security: Proceedings of the 35th International Conference, SAFECOMP 2016, Trondheim, Norway, 21–23 September 2016; Proceedings 35; Springer International Publishing: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
- Ruddle, A.; Ward, D.; Weyl, B.; Idrees, S.; Roudier, Y.; Friedewald, M.; Leimbach, T.; Fuchs, A.; Gürgens, S.; Henniger, O.; et al. Deliverable D2. 3: Security Requirements for Automotive On-Board Networks Based on Dark-Side Scenarios. EVITA Project. 2009. Available online: https://www.researchgate.net/profile/Gabriel-Pedroza/publication/304525166_Security_requirements_for_automotive_on-board_networks_based_on_dark-side_scenarios/links/57b06d4808ae15c76cba2666/Security-requirements-for-automotive-on-board-networks-based-on-dark-side-scenarios.pdf (accessed on 15 July 2023).
- Macher, G.; Armengaud, E.; Brenner, E.; Kreiner, C. Threat and risk assessment methodologies in the automotive domain. Procedia Comput. Sci. 2016, 83, 1288–1294. [Google Scholar] [CrossRef]
- Macher, G.; Sporer, H.; Berlach, R.; Armengaud, E.; Kreiner, C. SAHARA: A security-aware hazard and risk analysis method. In Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 9–13 March 2015; pp. 621–624. [Google Scholar]
- Threat Modeling Process. Available online: https://owasp.org/www-community/Threat_Modeling_Process#subjective-model-dread (accessed on 9 June 2023).
- Cagnazzo, M.; Hertlein, M.; Holz, T.; Pohlmann, N. Threat modeling for mobile health systems. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain, 15–18 April 2018; pp. 314–319. [Google Scholar]
- Dang, Q. Recommendation for Applications Using Approved Hash Algorithms; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2008. [Google Scholar]
- Macher, G.; Höller, A.; Sporer, H.; Armengaud, E.; Kreiner, C. A combined safety-hazards and security-threat analysis method for automotive systems. In Computer Safety, Reliability, and Security: Proceedings of the SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, 22 September 2015; Proceedings 34; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; pp. 237–250. [Google Scholar]
STRIDE Category | External Entity | Process | Data Flow | Data Store |
---|---|---|---|---|
Spoofing | ✓ | ✓ | ||
Tampering | ✓ | ✓ | ✓ | |
Repudiation | ✓ | ✓ | ||
Information Disclosure | ✓ | ✓ | ✓ | |
Denial of Service | ✓ | ✓ | ✓ | |
Elevation of Privilege | ✓ |
Threat Modeling Methodology | Attack Perspective | Advantages | Disadvantages |
---|---|---|---|
PASTA [34] | Risk centric | The model is DFD-based and suggests mitigation techniques. | The model is not automatic. |
Attack Tree [36] | Attacker | The model identifies all possible attack vectors. | The model is not DFD-based and does not suggest mitigation techniques. The model lacks automation and may become overly complex for large systems. |
CVSS [48] | Scoring | The model is automatic and provides a standardized method for evaluating vulnerabilities. | The model is not DFD-based and does not suggest mitigation techniques. |
OCTAVE [42,49] | Operational risks | The model offers four threat trees to aid threat modelers in contemplating additional threats: human actors employing technical means, human actors utilizing physical access, technical problems, and miscellaneous issues. | The model is not DFD-based and automatic. |
VAST [50] | Attacker | The model is DFD-based, automatic, and suggests mitigation techniques. | The requirement to create two types of models may increase the complexity and resource requirements for organizations. |
LINDDUN [51] | Privacy concerns | The model is DFD-based, and suggests mitigation techniques. | The model is not automatic. |
STRIDE [52,53] | Defender | The model is DFD-based and suggests mitigation techniques. The model is automatic and identifies vulnerabilities at the component level. | The results may be inconsistent. |
Level | Knowledge Example | Resources Example | Threat Criticality Example |
---|---|---|---|
0 | No previous knowledge | No tools required | No impact |
1 | Basic knowledge of system | Standard tools, screwdriver | Partial service disruption |
2 | Proficient knowledge of internals with focused interests | Simple tools like sniffer, oscilloscope | Significant damage, manipulation of invoice and privacy |
3 | Advanced tools like bus communication simulators, flasher | High security impact possible |
R | K | T | |||
---|---|---|---|---|---|
0 | 1 | 2 | 3 | ||
0 | 0 | 0 | 3 | 4 | 4 |
1 | 0 | 2 | 3 | 4 | |
2 | 0 | 1 | 2 | 3 | |
1 | 0 | 0 | 2 | 3 | 4 |
1 | 0 | 1 | 2 | 3 | |
2 | 0 | 0 | 1 | 2 | |
2 | 0 | 0 | 1 | 2 | 3 |
1 | 0 | 0 | 1 | 2 | |
2 | 0 | 0 | 0 | 1 | |
3 | 0 | 0 | 0 | 1 | 2 |
1 | 0 | 0 | 0 | 1 | |
2 | 0 | 0 | 0 | 1 |
Rating | High | Medium | Low |
---|---|---|---|
Damage (D) | Extensive data loss, compromise of full system | Moderate data loss, potential compromise of personal or sensitive data | Limited data loss, minor information |
Reproducibility (R) | Highly unlikely to be reproduced, requires extremely specific and uncommon circumstances | Possible to reproduce, but requires specialized knowledge or specific conditions | Easily reproducible with minimal effort |
Exploitability (E) | Requires extensive knowledge, sophisticated tools and complex methods | Requires moderate technical skills, advanced tools and some effort | Requires basic technical knowledge and commonly available tools |
Affected Users (A) | Many users affected, substantial impact on user privacy or security | Some users affected, potential inconvenience or minimal harm | Few users affected, limited impact on individuals |
Discoverability (D) | Highly hidden, requires specialized expertise, extensive analysis, or insider knowledge | Hidden but discoverable with careful examination or targeted testing | Easily detected |
Risk Assessment Methodology | Application Phase | Advantages | Disadvantages |
---|---|---|---|
FMVEA [59] | System | The model identifies the effects of threats and attack possibilities. | The model is not suitable for concept phase as it can easily overlook multi-stage attacks. |
SHIELD [60] | System | The model is a security, privacy and dependability assessing method. | The model is not suitable for early design phase. |
CHASSIS [60] | Concept | The model uses HAZOP tables in combination with the BDMP (boolean logic-driven Markov Processes) technique. | The model requires modeling of misuse cases and misuse sequence diagrams. |
HEAVENS [60] | System | The model utilizes the STRIDE threat modeling approach, providing enhanced support for estimating threat scenarios. | The likelihood of an attack is determined by evaluating the complexity involved in executing a particular attack scenario. In the conceptual phase, system architecture details and hardware/software components may still be subject to change or remain undetermined. |
EVITA [60] | Concept | The model categorizes threats into various classes, including functional, safety, privacy, and operational severity. | The severity classification does not comply with the ISO 26262 standard and the accuracy of attack potential measure may not be determined. |
SAHARA [60,63] | Concept | Combining STRIDE threat modeling, the model simplifies threat classification, requiring minimal effort and employing a simple quantification scheme. | The model might fail to account for multi-stage attacks. |
DREAD [64] | Concept | The model is suitable for evaluating remote cybersecurity attacks and attacks that affect entire vehicle operations. | The model may oversimplify complex threat scenarios and overlook certain aspects of security. |
Components or Interactions | Threat No. | Threat Details | Threat Category |
---|---|---|---|
Onboard computer | 1 | An adversary can replicate the user actions to impersonate the process of onboard computer. | Spoofing |
2 | An adversary may modify any given command and instruction resulting in the modification of the system such as NFC to onboard computer. | Tampering | |
3 | Without proper monitoring and control, the onboard computer can be subject to malicious exploitation. | Repudiation | |
4 | An adversary may steal or share any personal information with anyone, which may violate the user’s privacy. | Information Disclosure | |
5 | In order to deny users of the onboard computer’s services, an adversary may flood it with requests so normal traffic cannot be processed. | Denial of Service | |
6 | Without the required authorization, an adversary might obtain access to the onboard computer and carry out privileged operations. | Elevation of Privilege | |
NFC_to_OBC | 7 | Onboard computer may crash, halt, stop, or run slowly because of the fake requests sent by the adversary through NFC. | Denial of Service |
8 | An adversary may interrupt data flowing across NFC to onboard computer with a snipping device and send a massive volume of data over the communication channel. | Denial of Service | |
9 | An adversary can intercept NFC data and use it to attack other parts of the system. | Information Disclosure | |
10 | An adversary may tamper the data flow from NFC to onboard computer in order to gain a particular advantage (not unlocking the door). | Tampering | |
OBC_to_Wi-Fi | 11 | Wi-Fi and cellular network may crash or halt due to the overflow of traffic causing not connecting to the network. | Denial of Service |
12 | An adversary may interrupt data flowing across onboard computer to Wi-Fi and cellular network with a snipping device, and session hijacking may occur. | Denial of Service | |
13 | The data passing from onboard computer to Wi-Fi and cellular network may sniffed by the adversary causing the leakage of personal information. | Information Disclosure | |
14 | An adversary may tamper the data flow from onboard computer to Wi-Fi and cellular network and modify information to take remote control of the device. | Tampering | |
Wi-Fi_to_OBC | 15 | Onboard computer may crash, halt, stop, or run slowly due to the adversary making the resources and services unavailable. | Denial of Service |
16 | An adversary can disrupt the onboard computer’s performance by overwhelming its communication channels with a high volume of data, interrupting Wi-Fi and cellular network data flow. | Denial of Service | |
17 | The data passing from Wi-Fi and cellular network to onboard computer may sniffed by the adversary. This may lead to compliance violations. | Information Disclosure | |
18 | An adversary may tamper the data flow from Wi-Fi and cellular network to onboard computer and alter information. | Tampering | |
OBC_to_Bluetooth | 19 | Bluetooth may crash, halt, stop, or run slowly due to the adversary making the resources and services unavailable. | Denial of Service |
20 | An external adversary may interrupt data flowing across a trust boundary by sending a large amount of data over communication channel. | Denial of Service | |
21 | The data passing from onboard computer to Bluetooth may sniffed by the adversary and disclose call logs or messages. | Information Disclosure | |
22 | An adversary may tamper the data flow from onboard computer to Bluetooth and alter information. | Tampering | |
Bluetooth_to_OBC | 23 | Onboard computer may crash, halt, stop, or run slowly because of the fake requests sent by the adversary. | Denial of Service |
24 | An external adversary may interrupt data flow and keep the system busy to respond to fake requests. | Denial of Service | |
25 | The data passing from onboard computer to Bluetooth may sniffed by the adversary. Based on the type of Information Disclosure, this may lead to attacks on other parts of the system. | Information Disclosure | |
26 | An adversary may tamper with the data flow from Bluetooth to onboard computer and make unauthorized manipulation to the system. | Tampering | |
OBC_to_CB | 27 | An adversary may tamper the data flow from onboard computer to CAN bus and disclose the system information. | Denial of Service |
28 | An adversary may interrupt data flowing across onboard computer to CAN bus in either direction. | Denial of Service | |
29 | An adversary may tamper the data flow from onboard computer to CAN bus and disclose the system information. | Information Disclosure | |
30 | An adversary can manipulate Bluetooth data to cause a Denial of Service or Elevation of Privilege on the CAN bus. | Tampering | |
CB_to_OBC | 31 | Onboard computer may crash, halt, stop, or run slowly due to the adversary making the resources and services unavailable. | Denial of Service |
32 | An adversary may interrupt data flow across CAN bus to onboard computer in either direction. | Denial of Service | |
33 | An adversary can sniff the data flow, potentially enabling attacks on other system components based on the disclosed information. | Information Disclosure | |
34 | An adversary may tamper the data flow from CAN bus to onboard computer and alter information. | Tampering |
Threat No. | SAHARA | DREAD | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
K | R | T | SecL | Priority | D | R | E | A | D | Sum | Priority | |
1 | 2 | 2 | 3 | 1 | High | 3 | 3 | 3 | 3 | 2 | 13 | High |
2 | 2 | 2 | 2 | 0 | Low | 3 | 2 | 3 | 2 | 2 | 10 | Medium |
3 | 2 | 3 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
4 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
5 | 1 | 2 | 2 | 1 | Low | 2 | 2 | 3 | 2 | 2 | 11 | Medium |
6 | 2 | 3 | 3 | 1 | High | 3 | 2 | 2 | 2 | 3 | 12 | High |
7 | 1 | 2 | 2 | 1 | Low | 2 | 3 | 2 | 3 | 2 | 12 | High |
8 | 2 | 3 | 3 | 1 | High | 3 | 3 | 2 | 3 | 1 | 12 | High |
9 | 2 | 2 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
10 | 2 | 1 | 3 | 2 | High | 3 | 2 | 3 | 3 | 2 | 13 | High |
11 | 1 | 3 | 2 | 0 | Low | 2 | 3 | 1 | 2 | 2 | 10 | Medium |
12 | 2 | 3 | 3 | 1 | High | 2 | 2 | 3 | 3 | 2 | 12 | High |
13 | 1 | 2 | 3 | 2 | High | 3 | 2 | 3 | 3 | 2 | 13 | High |
14 | 2 | 3 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
15 | 2 | 3 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
16 | 2 | 3 | 3 | 1 | High | 2 | 3 | 2 | 3 | 2 | 12 | High |
17 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 2 | 3 | 12 | High |
18 | 2 | 3 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
19 | 1 | 2 | 2 | 1 | Low | 3 | 2 | 2 | 3 | 2 | 12 | High |
20 | 2 | 3 | 3 | 1 | High | 2 | 2 | 3 | 3 | 2 | 12 | High |
21 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
22 | 2 | 2 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
23 | 1 | 2 | 3 | 2 | High | 2 | 3 | 2 | 3 | 2 | 12 | High |
24 | 2 | 2 | 3 | 1 | High | 2 | 3 | 2 | 3 | 2 | 12 | High |
25 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 2 | 2 | 12 | High |
26 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
27 | 1 | 2 | 3 | 2 | High | 3 | 2 | 3 | 3 | 2 | 13 | High |
28 | 2 | 2 | 3 | 1 | High | 2 | 2 | 3 | 3 | 2 | 12 | High |
29 | 2 | 2 | 3 | 1 | High | 3 | 2 | 3 | 2 | 2 | 12 | High |
30 | 2 | 3 | 3 | 1 | High | 3 | 2 | 3 | 3 | 2 | 13 | High |
31 | 1 | 3 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
32 | 2 | 2 | 3 | 1 | High | 3 | 2 | 3 | 3 | 2 | 13 | High |
33 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
34 | 2 | 2 | 3 | 1 | High | 3 | 2 | 2 | 3 | 2 | 12 | High |
Components or Interactions | Threat No. | Threat Category | Mitigation Strategy |
---|---|---|---|
Onboard Computer | 1 | Spoofing | A standard authentication mechanism, like multifactor authentication or biometric authentication, can be used to identify and prevent unauthorized access. |
2 | Tampering | Digital signatures to ensure that the data has not been changed by the malicious users. | |
3 | Repudiation | Logging to record the tasks of the users is recommended. | |
4 | Information Disclosure | Encryption and access controls mechanisms to limit access to sensitive data are recommended. | |
5 | Denial of Service | Implemention of throttling mechanisms and load balancing through the distribution of traffic across multiple servers are state-of-the art methods. | |
6 | Elevation of Privileges | Proper access control mechanisms considering “need to know principles” are used for the prevention. For the detection, user activity monitoring and logging for potential privilege escalation attempts. | |
NFC_to_OBC | 7, 8 | Denial of Service | Multiple communication channels with diverse technologies between NFC and OBC are required. |
9 | Information Disclosure | Encrypting the data flow between the NFC and OBC is recommended. | |
10 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the NFC and OBC. | |
OBC_to_Wi-Fi | 11, 12 | Denial of Service | Multiple communication channels with diverse technologies between OBC and WiFi are required. |
13 | Information Disclosure | Encrypting the data flow between the OBC and WiFi is needed. | |
14 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the OBC and WiFi. | |
Wi-Fi_to_OBC | 15, 16 | Denial of Service | Multiple communication channels with diverse technologies between WiFi and OBC are required. |
17 | Information Disclosure | Encrypting the data flow between the WiFi and OBC is needed. | |
18 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the WiFi and OBC. | |
OBC_to_Bluetooth | 19, 20 | Denial of Service | Multiple communication channels with diverse technologies between OBC and Bluetooth are required. |
21 | Information Disclosure | Encrypting the data flow between the OBC and Bluetooth is needed. | |
22 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the OBC and Bluetooth. | |
Bluetooth_to_OBC | 23, 24 | Denial of Service | Multiple communication channels with diverse technologies between Bluetooth and OBC are required. |
25 | Information Disclosure | Encrypting the data flow between the Bluetooth and OBC is needed. | |
26 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the Bluetooth and OBC. | |
OBC_to_CB | 27, 28 | Denial of Service | Implementing traffic limitation and load balancing through the distribution of traffic across multiple servers between OBC and CB are required. |
29 | Information Disclosure | Encrypting the data flow between the Bluetooth and OBC is needed. | |
30 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the OBC and CB. | |
CB_to_OBC | 31, 32 | Denial of Service | Multiple communication channels with diverse technologies between CB and OBC are required. |
33 | Information Disclosure | Encrypting the data flow between the CB and OBC is needed. | |
34 | Tampering | Message Authentication Code (MAC) or digital signatures are required for the detection of the Tampering of the data between the CB and OBC. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Das, P.; Asif, M.R.A.; Jahan, S.; Ahmed, K.; Bui, F.M.; Khondoker, R. STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System. Vehicles 2024, 6, 1140-1163. https://doi.org/10.3390/vehicles6030054
Das P, Asif MRA, Jahan S, Ahmed K, Bui FM, Khondoker R. STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System. Vehicles. 2024; 6(3):1140-1163. https://doi.org/10.3390/vehicles6030054
Chicago/Turabian StyleDas, Popy, Md. Rashid Al Asif, Sohely Jahan, Kawsar Ahmed, Francis M. Bui, and Rahamatullah Khondoker. 2024. "STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System" Vehicles 6, no. 3: 1140-1163. https://doi.org/10.3390/vehicles6030054
APA StyleDas, P., Asif, M. R. A., Jahan, S., Ahmed, K., Bui, F. M., & Khondoker, R. (2024). STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System. Vehicles, 6(3), 1140-1163. https://doi.org/10.3390/vehicles6030054