Security Threat Analysis Tool "Attack Tree"
An Attack Tree is a threat analysis tool that assists in measures to protect autonomous vehicles from threats such as hacking.
With the increasing interest in autonomous driving, the complexity of onboard systems is expected to rise, necessitating not only safety requirements but also security assessments. In Europe, security evaluations are already being conducted in parallel with safety assessments, and the attack tree method exists as a means to carry out security evaluations. The security threat analysis tool Attack Tree provided by Isograph Ltd. (UK) is designed to assist in assessing security vulnerabilities in software. For example, the following representations are possible: - Visual representation of how an attack can succeed - Representation of which attacks have the highest likelihood of success using probability distributions Furthermore, it is also possible to express indicators such as: - The method that has the lowest cost and highest probability of success for an attacker - The difficulty of executing the attack and whether special equipment is required Security assessment is a factor directly related to the safety of vehicles. By referencing the probabilities of threats identified using the Attack Tree within the functional safety Fault Tree, it becomes possible to conduct evaluations that consider both safety and threats.
basic information
**Main Features of Attack Tree** - Construction of attack trees - Mitigation trees - Execution of analysis - Report designer functionality **Other Information** The concept of Attack Tree is similar to Fault Tree and can also perform: - Cut set analysis - Importance calculation In addition to security threat analysis for autonomous vehicles, Attack Tree can be used in: - Cybersecurity - Network security - Banking system security By using Attack Tree, it is possible to visually and concisely model and analyze external threats. Furthermore, by reflecting the analysis results, it encourages the design or redesign of systems, enabling the construction of safer systems.
Price range
P5
Delivery Time
P3
Model number/Brand name
Attack Tree
Applications/Examples of results
You can utilize it in fields that require high security, such as cybersecurity, network security, banking system security, automotive cybersecurity, and personal data security.