HoliSec Results

Results from project HoliSec are presented on this page. As time goes by, more reports will be published here. All information here is available for our readers to download and disseminate.


Holisec final open workshop 26/3, 2019: Presentations are now uploaded on the conference webpage. 

D1.1 Security & privacy for connected & automated vehicles

This document will give a short introduction to the subject of security and privacy in vehicles and define some of the questions that need to be addressed in developing, manufacturing, service, and operations of vehicles. A selection of use cases is explored to elaborate needs and requirements


D1.2 A State-of-the-Art Report on Vehicular Security
This report provides insight into the state of current research frontiers in vehicular security. It also serves as an introduction to the issues related to vehicular security with an extensive reference list for more detailed studies.


D2  HEAling Vulnerabilities to ENhance Software Security and Safety
This document presents the HEAVENS Security Model. Since HoliSec D4.1.1 builds heavily upon the work presented in HEAVENS D2, and the fact that HEAVENS D2 is not available online, it has been made available here for the reader to more easily digest the content of HoliSec D4.1.1


D3.2 Secure Communication
This document presents a summary of our achievements in the area of security mechanisms for connected vehicles. We contribute to different areas, such as internal communication, requirements engineering, software development, and V2X communication.


D4.1.1  Tailoring the HEAVENS risk assessment methodology for improved performance
This document presents lessons learned from the usage of the HEAVENS Security Model in industrial projects along with tailoring proposals to achieve improved risk assessment efficiency. This deliverable aims to improve efficiency for the practitioners of the HEAVENS Security model, as well as for academia to learn how the methodology has been used and tailored to the industry.


D4.1.3 HoliSec Reference Architecture
The document elaborates the definition of a reference architecture that is used as a basis for the HoliSec project when evaluating different security concepts, such as threat analysis, risk assessment, secure diagnostic mechanisms, and key management.


Master thesis: Evaluation of Security Mechanisms
This Master thesis identifies security issues related to centralization of functionality in the automotive domain, and investigate mechanisms which mitigate these issues. Further, it investigates the support, both in hardware and software, for these mechanisms in the current and future automotive embedded systems.


Master thesis: Design Flaws as Security Threats
This Master thesis proposes a manual approach in the form of a catalog of design flaws along with detection guidelines in order to detect design flaws related to security threats. A descriptive study is conducted to evaluate the effectiveness and productivity of the approach, as well as how the detected flaws can be related to threats identified by STRIDE.


Towards security threats that matter
This document contains the publication related to a proposal of a novel approach for performing threat analysis efficiently. The risk-first end-to-end asset analysis approach is based on (a) enriching the architectural model and (b) leveraging such information to perform model abstractions and to reduce effort during threat analysis. In particular, the extended notation also includes security assumptions and constraints about the solution space.


Two threat analysis techniques compared: elements in isolation vs elements in context
This document presents a pre-printed version of an empirical study conducted in the academic context. The controlled experiment provides empirical evidence about the differences between two popular threat analysis techniques (namely, STRIDE-per-element and STRIDE-per-interaction) in terms of productivity, precision and recall. The main results of this study show that in the context of the experiment, minor differences were observed.


A systematic literature review of threat analysis techniques
This document contains the pre-printed version of a study where 26 threat analysis methodologies are compared in terms of their applicability, characteristics of the required input for analysis, characteristics of analysis procedure, characteristics of analysis outcomes and ease of adoption. The study also provides some insight into the obstacles for adopting the existing approaches and discusses the current state of their adoption in software engineering trends.




If you have any question, please contact Anne Faxér at RISE.