CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software

被引:1
|
作者
Koley, Ipsita [1 ]
Dey, Soumyajit [1 ]
Mukhopadhyay, Debdeep [1 ]
Singh, Sachin [2 ]
Lokesh, Lavanya [2 ]
Ghotgalkar, Shantaram Vishwanath [2 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur 721302, W Bengal, India
[2] Robert Bosch Engn & Business Solut Private Ltd, Bangalore, Karnataka, India
关键词
CPS; safety verification; formal methods; Vehicle Stability Control system; SYSTEMS;
D O I
10.1145/3571287
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Modern vehicles contain a multitude of electronic control units that implement software features controlling most of the operational, entertainment, connectivity, and safety aspects of the vehicle. However, with security requirements often being an afterthought in automotive software development, incorporation of such software features with intra- and inter-vehicular connectivity requirements often opens up new attack surfaces. Demonstrations of such security vulnerabilities in past reports and literature bring in the necessity to formally analyze how secure automotive control systems really are against adversarial attacks. Modern vehicles often incorporate onboard monitoring systems that test the sanctity of data samples communicated among controllers and detect possible attack/noise insertion scenarios. The performance of such monitors against security threats also needs to be verified. In this work, we outline a rigorous methodology for estimating the vulnerability of automotive CPSs. We provide a computer-aided design framework that considers the model-based representation of safety-critical automotive controllers and monitoring systems working in a closed loop with vehicle dynamics and verifies their safety and robustness w.r.t. false data injection attacks. Symbolically exploring all possible combinations of attack points of the input automotive CPS, the proposed framework tries to find out which sensor and/or actuation signal is vulnerable by generating stealthy and successful attacks using a formal method-based counter-example guided abstract refinement process. We also validate the efficacy of the proposed framework using a case study performed in an industry-scale simulator.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Security and Reliability of Safety-Critical RTOS
    Luna R.
    Islam S.A.
    SN Computer Science, 2021, 2 (5)
  • [42] An approach for testing safety-critical software
    Li, WW
    Xu, ZW
    Jin, Y
    NINTH GREAT LAKES SYMPOSIUM ON VLSI, PROCEEDINGS, 1999, : 180 - 183
  • [43] SAFETY-CRITICAL SOFTWARE - A RESEARCH AGENDA
    BERZTISS, AT
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 1994, 4 (02) : 165 - 181
  • [44] Software testing for safety-critical applications
    Wang, LF
    Tan, KC
    IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2005, 8 (02) : 38 - 47
  • [45] Towards the Design of Safety-Critical Software
    Rafeh, R.
    Rabiee, A.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 683 - 694
  • [46] Timing tolerances in safety-critical software
    Wassyng, A
    Lawford, M
    Hu, XY
    FM 2005: FORMAL METHODS, PROCEEDINGS, 2005, 3582 : 157 - 172
  • [47] Automotive Architecture Topologies: Analysis for Safety-Critical Autonomous Vehicle Applications
    Frigerio, Alessandro
    Vermeulen, Bart
    Goossens, Kees G. W.
    IEEE ACCESS, 2021, 9 : 62837 - 62846
  • [48] Analysis of the Impact of Lens Blur on Safety-Critical Automotive Object Detection
    Molloy, Dara
    Mueller, Patrick
    Deegan, Brian
    Mullins, Darragh
    Horgan, Jonathan
    Ward, Enda
    Jones, Edward
    Braun, Alexander
    Glavin, Martin
    IEEE ACCESS, 2024, 12 : 3554 - 3569
  • [49] CERTIFICATION OF SAFETY-CRITICAL SOFTWARE BY LICENSED SOFTWARE ENGINEERS
    DAVIS, PI
    COMPUTER, 1992, 25 (12) : 72 - 73
  • [50] DESIGN OF A PLATFORM FOR SAFETY JUSTIFICATION OF SAFETY-CRITICAL SOFTWARE
    Guo Jia
    Yang Ming
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 1, 2017,