An Attack Tree is a threat analysis tool that assists in measures to protect autonomous vehicles from threats such as hacking.
With the growing interest in autonomous driving, the complexity of onboard systems is expected to increase, necessitating not only safety requirements but also security assessments. In Europe, security evaluations are already being conducted in parallel with safety assessments, and one method for conducting security evaluations is the attack tree. The Attack Tree security threat analysis tool provided by Isograph (UK) is designed to assist in evaluating security vulnerabilities in software. For example, it allows for the following expressions: - A visual representation of how an attack can succeed - A probability distribution showing which attacks have the highest likelihood of success Furthermore, it can also represent indicators such as: - The method that is the lowest cost and has the highest probability of success for the attacker - The difficulty of executing the attack and whether special equipment is required Security assessments are directly related to the safety of vehicles. By referencing the probabilities of threats identified using the Attack Tree within the functional safety Fault Tree, it becomes possible to conduct evaluations that consider both safety and threats.
Inquire About This Product
basic information
**Main Features of Attack Tree** - Construction of attack trees - Mitigation trees - Execution of analysis - Report designer functionality **Other Information** The concept of Attack Tree is similar to Fault Tree, allowing for: - Cut set analysis - Importance calculation, etc. In addition to security threat analysis for autonomous vehicles, Attack Tree can be used in: - Cybersecurity - Network security - Banking system security This enables the visual and concise modeling and analysis of external threats. Furthermore, by reflecting the analysis results in the design or redesign of systems, it becomes possible to build safer systems.
Price range
P5
Delivery Time
P3
Applications/Examples of results
You can utilize it in fields that require high security, such as cybersecurity, network security, banking system security, automotive cybersecurity, and personal confidentiality security.
catalog(1)
Download All CatalogsCompany information
Our company develops and sells a "Maintenance Management System" for managing and operating various plants, factories, and other facilities and assets. Currently, this system is undergoing significant evolution into a system that incorporates IoT technologies, such as sensor information and input from tablet devices, as well as AI technologies like machine learning, featuring functions for failure prediction and automatic scheduling. Additionally, as part of the recent trend of digital transformation (DX), there is a growing movement to digitize and automate manufacturing processes and research and development sites in factories to improve operational efficiency. In line with this trend, our company provides a solution aimed at enhancing efficiency in research and development environments, which is the Laboratory Information Management System (LIMS). This software includes features such as workflow management, data tracking, data management, data analysis, and integration of electronic lab notebooks.