CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software

被引:1
|
作者
Koley, Ipsita [1 ]
Dey, Soumyajit [1 ]
Mukhopadhyay, Debdeep [1 ]
Singh, Sachin [2 ]
Lokesh, Lavanya [2 ]
Ghotgalkar, Shantaram Vishwanath [2 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur 721302, W Bengal, India
[2] Robert Bosch Engn & Business Solut Private Ltd, Bangalore, Karnataka, India
关键词
CPS; safety verification; formal methods; Vehicle Stability Control system; SYSTEMS;
D O I
10.1145/3571287
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Modern vehicles contain a multitude of electronic control units that implement software features controlling most of the operational, entertainment, connectivity, and safety aspects of the vehicle. However, with security requirements often being an afterthought in automotive software development, incorporation of such software features with intra- and inter-vehicular connectivity requirements often opens up new attack surfaces. Demonstrations of such security vulnerabilities in past reports and literature bring in the necessity to formally analyze how secure automotive control systems really are against adversarial attacks. Modern vehicles often incorporate onboard monitoring systems that test the sanctity of data samples communicated among controllers and detect possible attack/noise insertion scenarios. The performance of such monitors against security threats also needs to be verified. In this work, we outline a rigorous methodology for estimating the vulnerability of automotive CPSs. We provide a computer-aided design framework that considers the model-based representation of safety-critical automotive controllers and monitoring systems working in a closed loop with vehicle dynamics and verifies their safety and robustness w.r.t. false data injection attacks. Symbolically exploring all possible combinations of attack points of the input automotive CPS, the proposed framework tries to find out which sensor and/or actuation signal is vulnerable by generating stealthy and successful attacks using a formal method-based counter-example guided abstract refinement process. We also validate the efficacy of the proposed framework using a case study performed in an industry-scale simulator.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Timing Analysis of Safety-Critical Automotive Software: The AUTOSAFE Tool Flow
    Becker, M.
    Mohamed, S.
    Albers, K.
    Chakrabarti, P. P.
    Chakraborty, S.
    Dasgupta, P.
    Dey, S.
    Metta, R.
    2015 22ND ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2015), 2015, : 385 - 392
  • [2] A New Approach for Developing Safety-Critical Software in Automotive Industry
    Fang, Qiu
    Zhang, Chenxi
    Ye, Xin
    Shi, Jianqi
    Zhang, Xiaoxian
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 64 - 69
  • [3] Efficient Software Tool Qualification for Automotive Safety-Critical Systems
    Astrom, Alexander
    Izosimov, Viacheslav
    Orsmark, Ola
    ELEKTRONIK IM KRAFTFAHRZEUG: ELEKTRIK, ELEKTRONIK, ELEKTROMOBILITAT, 2011, 2132 : 361 - 370
  • [4] Modelling Support for Design of Safety-Critical Automotive Embedded Systems
    Chen, DeJiu
    Johansson, Rolf
    Loenn, Henrik
    Papadopoulos, Yiannis
    Sandberg, Anders
    Toerner, Fredrik
    Toerngren, Martin
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 72 - +
  • [5] Safety-critical software
    1600, IEEE Computer Society (30):
  • [6] Safety-Critical Software
    Merino, Pedro
    Schoitsch, Erwin
    ERCIM NEWS, 2008, (75): : 12 - 13
  • [7] SAFETY-CRITICAL SOFTWARE
    PANCUCCI, D
    ENGINEERING, 1991, 231 (08): : 45 - 47
  • [8] ON THE SAFETY ANALYSIS OF REQUIREMENTS SPECIFICATIONS FOR SAFETY-CRITICAL SOFTWARE
    SAEED, A
    DELEMOS, R
    ANDERSON, T
    ISA TRANSACTIONS, 1995, 34 (03) : 283 - 295
  • [10] Reducing Software Assurance Risks for Security-Critical and Safety-Critical Systems
    Axelrod, C. Warren
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,