Automating Function-Level TARA for Automotive Full-Lifecycle Security

📅 2025-04-25
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
The increasing complexity of connected and autonomous vehicles (CAVs) exacerbates cybersecurity risks, while conventional Threat Analysis and Risk Assessment (TARA) methods—relying on static threat libraries—lack the granularity required for functional-level analysis. To address this, we propose the first full-lifecycle, function-level TARA automation framework. It leverages a multi-agent large language model (LLM) architecture, integrating LoRA fine-tuning and Retrieval-Augmented Generation (RAG) to enable dynamic component-level modeling, automated attack tree generation, and cross-domain regulatory standard alignment. We extend the OpenXSAM++ modeling language to support semantically rich threat representation. Evaluated across four automotive OEM projects, our framework identified 11 penetration-validated high-risk attack paths and generated over 8,200 attack trees—demonstrating significantly improved efficiency over manual analysis. The framework has been deployed in commercial platforms by UAES and Xiaomi, and extended to unmanned aerial and maritime systems.

Technology Category

Application Category

📝 Abstract
As modern vehicles evolve into intelligent and connected systems, their growing complexity introduces significant cybersecurity risks. Threat Analysis and Risk Assessment (TARA) has therefore become essential for managing these risks under mandatory regulations. However, existing TARA automation methods rely on static threat libraries, limiting their utility in the detailed, function-level analyses demanded by industry. This paper introduces DefenseWeaver, the first system that automates function-level TARA using component-specific details and large language models (LLMs). DefenseWeaver dynamically generates attack trees and risk evaluations from system configurations described in an extended OpenXSAM++ format, then employs a multi-agent framework to coordinate specialized LLM roles for more robust analysis. To further adapt to evolving threats and diverse standards, DefenseWeaver incorporates Low-Rank Adaptation (LoRA) fine-tuning and Retrieval-Augmented Generation (RAG) with expert-curated TARA reports. We validated DefenseWeaver through deployment in four automotive security projects, where it identified 11 critical attack paths, verified through penetration testing, and subsequently reported and remediated by the relevant automakers and suppliers. Additionally, DefenseWeaver demonstrated cross-domain adaptability, successfully applying to unmanned aerial vehicles (UAVs) and marine navigation systems. In comparison to human experts, DefenseWeaver outperformed manual attack tree generation across six assessment scenarios. Integrated into commercial cybersecurity platforms such as UAES and Xiaomi, DefenseWeaver has generated over 8,200 attack trees. These results highlight its ability to significantly reduce processing time, and its scalability and transformative impact on cybersecurity across industries.
Problem

Research questions and friction points this paper is trying to address.

Automating function-level TARA for automotive cybersecurity risks
Dynamic attack tree generation using LLMs and system configurations
Adapting to evolving threats with LoRA fine-tuning and RAG
Innovation

Methods, ideas, or system contributions that make the work stand out.

Automates function-level TARA with LLMs
Uses multi-agent framework for robust analysis
Incorporates LoRA fine-tuning and RAG
🔎 Similar Papers
No similar papers found.
Y
Yuqiao Yang
UESTC
Y
Yongzhao Zhang
UESTC
W
Wenhao Liu
GoGoByte Technology
J
Jun Li
GoGoByte Technology
P
Pengtao Shi
GoGoByte Technology
D
DingYu Zhong
UESTC
J
Jie Yang
UESTC
T
Ting Chen
UESTC
S
Sheng Cao
UESTC
Y
Yuntao Ren
Chengdu Anheng Information Technology Co., LTD
Y
Yongyue Wu
Anheng Vision(Chengdu) Information Technology Co., LTD
Xiaosong Zhang
Xiaosong Zhang
Tencent