Additionally, the results generated by the prototypical
implementation were evaluated with experts from the
automotive domain.
Concerning the generalizability of the case study
results, a threat is that the number of cases used in
this case study might be too small and the selected
cases might not be representative for the application
domain. To mitigate this threat, the cases were devel-
oped in cooperation with experts from the automotive
industry and are derived from an actual level 3 assis-
tance system.
6 CONCLUSION
In this paper, we introduce a method for the integrated
consideration of safety and security in early phases of
the system design. We evaluate our method on a level
3 assistance system called Highway Driving System.
The method focuses on an architectural level of sys-
tem development and builds upon existing analysis
methods of the safety and security domains, namely
FTA, STRIDE, and attack trees. At its very core, our
4-step method identifies for each attack which haz-
ards it may trigger and for each hazard which com-
binations of attacks and other faults it can be caused
by. This process is automated by our tooling to a large
extend.
Our approach supports the safety and security en-
gineers in a way such that security aspects can be
leveraged in the context of considering safety. In
more concrete terms, it helps to identify the impact
attacks can have on the safety of the vehicle via the
identification of hazards triggered by a certain attack.
Additionally, it helps to identify the influence safety
aspects have on security. Finally, the iterative na-
ture of the method ensures that the safety impact of
newly introduced security controls becomes apparent
in each following iteration.
In future work, the approach could be extended
to automatically propagate ASILs of hazards through
the SeCFT. This ASIL propagation would automati-
cally respect the ASIL tailoring rules defined in (ISO,
2018) and annotate ASILs to system components,
MSD requirements, and threats.
REFERENCES
Fockel, M. (2016). ASIL tailoring on functional safety re-
quirements. In Skavhaug, A., Guiochet, J., Schoitsch,
E., and Bitsch, F., editors, 5th International Work-
shop on Next Generation of System Assurance Ap-
proaches for Safety-Critical Systems (SASSUR), vol-
ume 9923 of LNCS. Springer International Publishing.
Co-located with SAFECOMP 2016.
Fockel, M. (2018). Safety Requirements Engineering for
Early SIL Tailoring. PhD thesis, Paderborn Univer-
sity.
Greenyer, J., Brenner, C., Cordy, M., Heymans, P., and
Gressi, E. (2013). Incrementally synthesizing con-
trollers from scenario-based product line specifica-
tions. In 9th Joint Meeting of the ESEC/FSE.
Harel, D. and Maoz, S. (2008). Assert and negate revisited:
Modal semantics for uml sequence diagrams. Soft-
ware & Systems Modeling, 7(2):237–252.
Holtmann, J. and Meyer, M. (2013). Play-out for hierarchi-
cal component architectures. In 11th Workshop on Au-
tomotive Software Engineering, volume P-220 of GI-
Edition – LNI. Koellen.
IEC (2003). IEC 60300-3-1: Dependability management –
Part 3-1: Application guide.
IEC (2006a). IEC 60812: Analysis techniques for system
reliability – Procedure for FMEA.
IEC (2006b). IEC 61025: Fault tree analysis (FTA).
ISO (2018). ISO 26262: Road vehicles – Functional safety.
ISO (2020). ISO DIS 21434: Road vehicles – Cybersecurity
engineering.
Kaiser, B., Liggesmeyer, P., and M
¨
ackel, O. (2003). A new
component concept for fault trees. In 8th Australian
workshop on Safety critical systems and software.
Kitchenham, B., Pickard, L., and Pfleeger, S. (1995). Case
studies for method and tool evaluation. IEEE Soft-
ware, 12(4):52–62.
Lisova, E.,
ˇ
Sljivo, I., and
ˇ
Cau
ˇ
sevi
´
c, A. (2019). Safety and
security co-analyses: A systematic literature review.
IEEE Systems Journal, 13(3):2189–2200.
Macher, G., Sporer, H., Berlach, R., Armengaud, E., and
Kreiner, C. (2015). SAHARA: A security-aware
hazard and risk analysis method. In 2015 Design,
Automation Test in Europe Conference Exhibition
(DATE).
Ruijters, E., Schivo, S., Stoelinga, M., and Rensink, A.
(2017). Uniform analysis of fault trees through model
transformations. In 2017 Annual Reliability and
Maintainability Symposium (RAMS), pages 1–7.
SAE (2021). SAE J3016: Taxonomy and Definitions for
Terms Related to Driving Automation Systems for On-
Road Motor Vehicles.
Schmittner, C., Gruber, T., Puschner, P., and Schoitsch, E.
(2014). Security application of failure mode and ef-
fect analysis (FMEA). In Bondavalli, A. and Di Gi-
andomenico, F., editors, Computer Safety, Reliability,
and Security (SAFECOMP 2014).
Schneier, B. (1999). Attack trees. Dr. Dobb´s journal,
24(12):21–29.
Shostack, A. (2014). Threat modeling: Designing for secu-
rity. John Wiley & Sons.
Sommer, F., D
¨
urrwang, J., and Kriesten, R. (2019). Sur-
vey and classification of automotive security attacks.
Information, 10(4):148.
Steiner, M. (2016). Integrating Security Concerns into
Safety Analysis of Embedded Systems Using Compo-
nent Fault Trees. PhD thesis, TU Kaiserslautern.
Steiner, M. and Liggesmeyer, P. (2015). Qualitative and
quantitative analysis of CFTs taking security causes
into account. In Computer Safety, Reliability, and Se-
curity (SAFECOMP 2015).
MODELSWARD 2022 - 10th International Conference on Model-Driven Engineering and Software Development
154