摘要: |
汽车信息系统的安全工作主要集中在分析、挖掘车载信息系统及其功能组件现存的安全漏洞及可行攻击方式的实验验证,缺乏全面、系统的车载信息系统安全测评体系及评估方法。论文在分析车载信息系统安全现状的基础之上,提出将车载信息系统的安全等级划分为:家用车载信息系统和商用车载信息系统,定义了两个等级车载信息系统的保护能力,并借鉴通用信息系统的安全等级保护要求,提出车载信息系统不同保护等级的基本安全要求,首次建立车载信息系统的安全等级测评体系。进一步建立层次化安全评估模型及算法,实现车载信息系统的定量安全评估。通过奥迪C6的安全测评案例证明,提出的等级测评体系及评估方法是可行、合理的,为分析车辆信息系统的安全状况提供支撑,填补了国内车载信息系统安全测评体系及评估方法的空白。 |
关键词: 车载网络 安全评估 层次分析法 安全漏洞 安全威胁 |
DOI:10.19363/j.cnki.cn10-1380/tn.2017.04.002 |
投稿时间:2016-08-05修订日期:2017-03-07 |
基金项目:国家自然科学基金(No.61562004,No.61431008,No.61271220);上海市信息化发展专项资金(201601074);中法国际合作与交流项目“徐光启2016”项目(No.36492NA) |
|
System and Approach of Security Testing and Evaluation for In-Vehicle Information Systems |
CHEN Xiuzhen,WU Yue,LI Jianhua |
School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China |
Abstract: |
The study of in-vehicle information system security mainly focuses on discovering and analyzing security vulnerabilities hidden in a car's information system and its function components, and on exploring the experimental way of feasible attacking means. There is no comprehensive and systematic security evaluation system and method in the field of in-vehicle information systems. This paper firstly attempts to build classified security evaluation system for in-vehicle systems, including put forward to divide in-car information system security into two levels: family car and business car, define their protection abilities based on analysis of current security status of the car information system, and design baseline for classified protection of in-vehicle system security with reference to security requirements of classified general information systems. Further this paper builds a hierarchical security evaluation model with three levels: index, criterion and security goal for in-car systems and its corresponding algorithm. It well reaches quantitative security evaluation of in-vehicle systems. The evaluation test results on Audi C6 demonstrate that the proposed classified security evaluation system and method are feasible and effective for analyzing security status and discovering security gaps of in-car systems. It fills the gap of classified security evaluation systems in the field of in-vehicle systems. |
Key words: in-vehicle network security evaluation analytic hierarchy process security vulnerabilities security threats |