Skip to main content
. 2022 Nov 26;22(23):9211. doi: 10.3390/s22239211

Table 9.

Overview of TARA methods in automotive domain.

Method Brief Description Application Scope Threat Model Co-Analysis
EVITA [59] A method in the E-safety Vehicle Intrusion Protected Applications (EVITA) project which provides four evaluation dimensions: safety, privacy, financial, and operational. Vehicular IT
systems
Attack tree Yes
HEAVENS [60] A method in the HEAling vulnerabilities to enhance software (HEAVENS) project, which provides a complete evaluation process to propose a systematic approach so that cybersecurity requirements for automotive electrical and electronic systems can be obtained Automotive
Electrical and electronic
systems
STRIDE Yes
FMVEA [61] FMVEA (Failure Mode, Vulnerabilities and Effects Analysis) extends the FMEA approach with security threat models Automotive cyber-physical systems STRIDE Yes
SAHARA [62] SAHARA (security-aware hazard analysis and risk assessment) is a method that combines HARA in functional safety and STRIDE threat models Automotive embedded systems STRIDE Yes
SARA [63] SARA is a systematic TARA framework that includes improved threat models, asset maps, new attack methods, attacker participation in the attack tree, and new driving system metrics Automated driving system STRIDELC,
Attack tree,
Attack map
Yes
CHASSIS [64] CHASSIS (Combined harm assessment of safety and security) is a safety and security co-analysis method for information systems based on HAZOP guidewords Automotive cyber-physical systems HAZOP Yes
TVRA [65] TVRA (Threat, Vulnerabilities, and implementation Risks Analysis) is a process-driven threat analysis and risk assessment method proposed by the European Telecommunications Standards Institute (ETSI) Automotive data/telecommunications networks Threat tree No
SINA [66] SINA (Security in Networked Automotive) is a method to identify security issues for Connected automotive systems Connected automotive systems STRIDE,
Attack tree
Yes
SGM [67] SGM (Security Guideword Method) is a safety analysis method using security guide words Automotive embedded systems SGM,
Attack Tree
Yes

STRIDE(LC) = Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (Linkability, Confusion).