Review Article

Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

Table 5

Comparison of performance of TARA tools.

ToolDeveloperFunctionQuantitativeDifficultyOutput

MTMTMicrosoftThreat modeling and analysisEasyReports of threat analysis
SecuriCADGenerating a possible attack path and the result of risk assessmentMediumRisk level/quantitative threat analysis results
GROOVEModeling the network architecture and generating an attack graphMediumAttack graph
OMNeT++SimulcraftPerforming network attack simulation and threat analysisMediumResults of network attack simulation and threat analysis
PTAPTA technologiesThreat modeling and calculating risk assessment resultsMediumSecurity level/parameters of the threat model/effectiveness analysis of countermeasures
SeaMonsterSourceForgeBuilding attack tree models and misoperation modelEasyThreat models
Threat DragonOWASPGenerating potential threats and corresponding mitigationsEasyList of a potential threat and corresponding mitigations