Threat Analysis Tools - List of Manufacturers, Suppliers, Companies and Products

Threat Analysis Tools Product List

1~2 item / All 2 items

Displayed results

Threat analysis tool Attacktree+ compliant with ISO/SAE 21434

Implementation of security evaluation in accordance with ISO/SAE 2143 is possible.

It is possible to carry out a series of tasks related to security evaluation in accordance with ISO/SAE 2143, including the definition of threats, impact assessment, attack paths, feasibility assessment, risk assessment, and countermeasures using this tool. We will provide a sample evaluation conducted using Attack tree+ based on ISO/SAE 2143 Annex G, as well as a demo version of the evaluation kit and Attack tree+ free of charge. If you are interested, please contact us at the following address: sales@wavefront.co.jp.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Threat Analysis Tool "Attack Tree"

An Attack Tree is a threat analysis tool that assists in measures to protect autonomous vehicles from threats such as hacking.

With the growing interest in autonomous driving, the complexity of onboard systems is expected to increase, necessitating not only safety requirements but also security assessments. In Europe, security evaluations are already being conducted in parallel with safety assessments, and one method for conducting security evaluations is the attack tree. The Attack Tree security threat analysis tool provided by Isograph (UK) is designed to assist in evaluating security vulnerabilities in software. For example, it allows for the following expressions: - A visual representation of how an attack can succeed - A probability distribution showing which attacks have the highest likelihood of success Furthermore, it can also represent indicators such as: - The method that is the lowest cost and has the highest probability of success for the attacker - The difficulty of executing the attack and whether special equipment is required Security assessments are directly related to the safety of vehicles. By referencing the probabilities of threats identified using the Attack Tree within the functional safety Fault Tree, it becomes possible to conduct evaluations that consider both safety and threats.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration