
functional safety, could provide a useful mechanism 
for  both  recording  and  maintaining  cybersecurity 
assurance claims. This paper has identified a number 
of essential requirements for a cybersecurity case for 
automotive applications, and differences from safety 
cases, as well as a range of particular challenges that 
will need to be overcome in future, for both safety and 
cybersecurity applications.    
ACKNOWLEDGEMENTS 
The  research  leading  to  these  results  has  received 
funding  from  the  European  Union’s  Horizon  2020 
research and innovation programme under the Marie 
Skłodowska-Curie  grant  agreement  No  812788 
(MSCA-ETN  SAS  –  Safer  Autonomous  Systems). 
This  publication  reflects  only  the  authors’  view, 
exempting  the  European  Union  from  any  liability. 
Project website: http://etn-sas.eu/. 
REFERENCES 
Armstrong, R., Hawkins, R. & Kelly, T. (2011). Security 
Assurance Cases: Motivation and the State of the Art. 
University of York Report CESG/TR/2011/1, April 2011 
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.
1.221.456&rep=rep1&type=pdf.  
Cui, J., Liew, L. S., Sabaliauskaite, G., & Zhou, F. (2018).      
A  review  on  safety  failures,  security  attacks,  and 
available countermeasures for autonomous vehicles. Ad 
Hoc Networks, 90 (December 2018), 101823. https:// 
doi.org/10.1016/j.adhoc.2018.12.006. 
Cui, J., Sabaliauskaite, G., Liew, L. S., Zhou, F., & Zhang, 
B. (2019). Collaborative Analysis Framework of Safety 
and Security for Autonomous Vehicles. IEEE Access, 
7  (March  2018),  148672–148683.  https://doi.org/ 
10.1109/ACCESS.2019.2946632. 
Giannakopoulou,  D.,  Pressburger,  T.,  Mavridou,  A.,  & 
Schumann,  J.  (2020).  Generation  of  Formal 
Requirements from Structured Natural Language. In N. 
Madhavji, L. Pasquale, A. Ferrari, & S. Gnesi (Eds.), 
Requirements  Engineering:  Foundation  for  Software 
Quality (pp. 19–35). Springer International Publishing. 
https://doi.org/10.1007/978-3-030-44429-7_2.  
Kelly,  T.,  &  Weaver,  R.  (2004).  The  Goal  Structuring 
Notation  –  A  Safety  Argument  Notation.  Elements. 
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.
1.1.66.5597&rep=rep1&type=pdf. 
Kelly, T. P., McDermid, J., & Weaver, R. (2005). “Goal-
Based Safety Standards: Opportunities and Challenges”, 
Proceedings  of  the  23rd  International  System  Safety 
Conf.,  San  Diego,  California  (August  2005).  https:/ 
/www-users.cs.york.ac.uk/~tpk/ISSC23.pdf.  
Leveson,  N.  (2011).  The  Use  of  Safety  Cases  in 
Certification and Regulation. MIT-ESD Working Paper 
Series  November  2011,  1–12.  https://dspace 
.mit.edu/bitstream/handle/1721.1/102833/esd-wp-2011 
-13.pdf?sequence=1&isAllowed=y. 
Macher,  G.,  Messnarz,  R.,  Armengaud,  E.,  Riel,  A., 
Brenner, E., & Kreiner, C. (2017). Integrated Safety and 
Security Development in the Automotive Domain. SAE 
Technical  Papers,  March  2017.  https://doi.org/10. 
4271/2017-01-1661. 
Ruddle, A.R., et al., (2020). Requirements and timescales 
for  CYB-R:  the  UK  Centre  of  excellence  for  road 
transport  cybersecurity  resilience,  ResiCAV  Project 
Deliverable  1,  30th  March  2020.  https://zenzic.io/ 
reports-and-resources/ 
Ruddle, A.R., & Ward, D.D. (2016). “Cyber Security Risk 
Analysis  for  Intelligent  Transport  Systems  and  In-
vehicle Networks”, in A. Perallos, U. Hernandez-Jayo, 
E.  Onieva  and  I.  Garcia  (Eds.)  Intelligent  Transport 
Systems:  Technologies  and  Applications,  Chapter  5, 
Wiley-Blackwell,  2016,  pp.  83–106.  https://doi.org/ 
10.1002/9781118894774.ch5.  
Shavit, M., Gryc, A., & Miucic, R. (2007). Firmware update 
over  the  Air  (FOTA)  for  automotive  industry.  SAE 
Technical  Papers,  724.  https://doi.org/10.4271/2007-
01-3523. 
Steger, M., Dorri, A., Kanhere, S. S., Römer, K., Jurdak, R., 
&  Karner,  M.  (2018).  Secure  Wireless  Automotive 
Software  Updates  Using  Blockchains:  A  Proof  of 
Concept. 137–149. https://doi.org/10.1007/978-3-319-
66972-4_12. 
Tanguy,  L.,  Tulechki,  N.,  Urieli,  A.,  Hermann,  E.,  & 
Raynal,  C.  (2016).  Natural  language  processing  for 
aviation  safety  reports:  From  classification  to 
interactive analysis. Computers in Industry, 78, 80–95. 
https://doi.org/10.1016/j.compind.2015.09.005.  
Toulmin,  S.  (1958).  The  Uses  of  Argument  Cambridge 
University Press. doi:10.1017/CBO9780511840005. 
Wang, P., Di, B., Zhang, H., Bian, K., & Song, L. (2018). 
Cellular  V2X  Communications  in  Unlicensed 
Spectrum:  Harmonious  Coexistence  with  VANET  in 
5G  Systems.  IEEE  Transactions  on  Wireless 
Communications,  17(8),  5212–5224.  https://doi.org/ 
10.1109/TWC.2018.2839183. 
Ward, D., Ibarra, I., & Ruddle, A. (2013). Threat Analysis 
and  Risk Assessment in Automotive Cyber Security. 
SAE  International  Journal  of  Passenger  Cars  - 
Electronic  and  Electrical  Systems,  6(2),  507–513. 
https://doi.org/10.4271/2013-01-1415. 
Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles
633