Assumptions of ECU capabilities can impact the 
future mapping between tools and ECUs. 
Furthermore, the same tools can be used for different 
types of functionality and in connection to different 
components. While the structure of the approach 
would remain the same, it is the tailoring of a specific 
system that might require inputs from experts. 
This paper illustrated the approach, but didn’t go 
into interdependencies of tools and testing 
infrastructures. Ensuring proportionality of tests, 
tools, and test outcomes is a subject for future 
research. Future mapping and applying will provide 
further insights on their appropriateness and 
sequences of their use. Test dependencies is another 
topic for future investigation. 
The illustrated list of tools is not exhaustive, 
rigorously constructed, or undisputable linked to the 
high-level functionality. To scope the list, we focused 
on technologies relevant to connected vehicles. The 
mentioned tools were identified based on their 
relevance to automated security testing, adversary 
emulation, vulnerability assessments, attack 
simulations, and identifying threats, such as threat 
management tools and attack trees. Yet, this is 
borrowed significantly from network and web testing. 
Future research could focus on more comprehensive 
studying how these and other tools can be used to 
devise advanced strategies of testing and simulated 
adversary activities.  
ACKNOWLEDGEMENTS 
The research is carried out as part of the SECREDAS 
project, which is co-funded by the ECSEL Joint 
Undertaking of the European Union under grant 
agreement number 783119 and the Netherlands 
Organization for Applied Scientific Research TNO. 
REFERENCES 
Applebaum, A., D. Miller, B. Strom, H. Foster, and C. 
Thomas, 2017, “Analysis of automated adversary 
emulation techniques.” In Proceedings of the Summer 
Simulation Multi-Conference (p. 16). Society for 
Computer Simulation International, July 2017.  
Arkin, B., S. Stender, and G. McGraw, 2005. “Software 
penetration testing. Security & Privacy, IEEE, 3(1): 84-
87. 
Assante M.J. and L.M. Lee, 2015, “The industrial control 
system cyber kill chain”. SANS Institute InfoSec 
Reading Room, 1 
Cheah, M., S.A. Shaikh, J. Bryans, and P. Wooderson, 
2018, “Building an automotive security assurance case 
using systematic security evaluations,” Computers & 
Security, 77, pp. 360-379. 
Felderer, M., M. Büchler, J. Martin, A. Brucker, R. Breu, 
and A. Pretschner, 2015, “Security Testing: A Survey”, 
10.1016/bs.adcom.2015.11.003. 
IBS, 2015, “International Business Times. Hackers disable 
Corvette brakes by texting dongle meant to lower 
insurance risk”, http://www.ibtimes.co.uk/hackers-
disablecorvette-brakes-by-texting-dongle-meant-
lower-insurance-risk-15151253, Last accessed on Dec 
20, 2019. 
IBS, 2016, “Hacker takes control of Nissan electric vehicle 
from other side of the world through Leaf app”,  
http://www.ibtimes.co.uk/hacker-takes-control-nissan-
electric-vehicle-otherside-world-through-leaf-app-
1545808. Last Accessed on Dec 20, 2019. 
Miller, D., R. Alford, A. Applebaum, H. Foster, C. Little, 
and B. Strom, 2018, “Automated adversary emulation: 
A case for planning and acting with unknowns,” 2018. 
Ming L. et al., 2018, "A General Testing Framework Based 
on Veins for Securing VANET Applications," IEEE 
SmartWorld, Guangzhou, pp. 2068-2073. 
Mouratidis H. and P. Giorgini, 2007, “Security Attack 
Testing (SAT)—testing the security of information 
systems at design time”. Information Systems. 32. 
1166-1183. 10.1016/j.is.2007.03.002 
ProfessionalQA, 2019, “Penetration Testing Tools: Top 
55”, July 16, http://www.professionalqa.com/ 
penetration-testing-tools.  Last accessed on Dec 20, 
2019. 
Samant, N., 2011, “Automated penetration testing” 
Software Testing Help website, 2019, “19 Powerful 
Penetration Testing Tools In 2020 (Security Testing 
Tools)”, Dec 14, https://www.softwaretestinghelp.com/ 
penetration-testing-tools/.  Last accessed on Dec 20, 
2019. 
Strom, B.E., J.A. Battaglia, M.S. Kemmerer, W. 
Kupersanin, D. Miller, C. Wampler, et al. 2017, 
“Finding cyber threats with ATT&CK-based 
analytics,” Technical Report MTR170202, MITRE. 
Wallingford, J., M. Peshwa, and D. Kelly, 2019, “Towards 
Understanding the Value of Ethical Hacking. In 
International Conference on Cyber Warfare and 
Security”, pp. 639-XIV. Academic Conferences 
International Limited. 
Wired, 2015, “GM Took 5 Years to Fix a Full-Takeover 
Hack in Millions of OnStar Cars”, 
https://www.wired.com/2015/09/gm-took-5-years-fix-
full-takeover-hack-millions-onstar-cars/#. Last 
accessed on Dec 20, 2019.