Skip to content

📊 Diagram: EVerest

Available Online

This model (converted to a data flow diagram) is available to view using the online editor!

Open In Online Editor

🔗 Link to Original Paper/Article

Open Example Model in Example Models Bundles

📝 Short Description

The EVerest model is based on an industry-driven open source project for Electric Vehicle charging stations and contains security requirements, documentation, a software architecture, and code. The requirements are manually labeled and include labels for security objectives, security elements, and trace links.

🔤 Abbreviations

  • EV: Electric Vehicle
  • TPM: Trusted platform module

📖 Extensive Description (if possible)

🏷️ Label description

  • 🗂️ Data Labels:

    • Status

      • Encrypted: Data is encrypted
      • Hashed: Data is hashed
      • Sensitive: Data contains sensitive information
      • Anonymized: Data is fully anonymized
      • Signed: Data is signed
      • Token: Data is a token
      • Certificate: Data is a certificate used for signing
      • PaymentInformation: Data is payment information
      • Firmware: Data is firmware
  • 🏷️ Node Labels:

    • Actor

      • EndUser: Actions performed by the end user
      • Engineer: Actions performed by system engineers
    • ActorStatus

      • Authorized: Actor is authorized to access the component
    • Component

      • API: Actions belonging to the API component
      • EVSESecurity: Actions performed by the security component of the system
      • PN532TokenProvider: Actions performed by the token provider
      • Logs: Actions concerning logging
    • Location

      • ChargingStation: Actions performed on Charging station
      • TPM: Actions performed on the trusted platform module
      • UpdateServer: Actions performed by the update server
      • PaymentProvider: Actions performed by the payment provider
      • Car: Actions performed on the car
      • ChargingStationManagementSystem: Actions performed by the system responsible for the charging stations
      • External: Actions performed by external entities
      • LocalStorage: Actions in local storage

⚠️ Constraints

see expected results

🚨 Violations

see expected results