Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On the Evaluation of Three Pre-Injection Analysis Techniques for Model-Implemented Fault- and Attack Injection
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0001-5224-9412
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0001-9536-4269
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0002-6427-4620
Volvo AB, Sweden.
2022 (English)In: IEEE 27th Pacific Rim International Symposium on Dependable Computing (PRDC 2022), 2022, p. 130-140Conference paper, Published paper (Refereed)
Abstract [en]

Fault- and attack injection are techniques used to measure dependability attributes of computer systems. An important property of such injectors is their efficiency that deals with the time and effort needed to explore the target system’s fault- or attack space. As this space is generally very large, techniques such as pre-injection analyses are used to effectively explore the space. In this paper, we study two such techniques that have been proposed in the past, namely inject-on-read and inject-on-write. Moreover, we propose a new technique called error space pruning of signals and evaluate its efficiency in reducing the space needed to be explored by fault and attack injection experiments. We implemented and integrated these techniques into MODIFI, a model-implemented fault and attack injector, which has been effectively used in the past to evaluate Simulink models in the presence of faults and attacks. To the best of our knowledge, we are the first to integrate these pre-injection analysis techniques into an injector that injects faults and attacks into Simulink models.The results of our evaluation on 11 vehicular Simulink models show that the error space pruning of signals reduce the attack space by about 30–43%, hence allowing the attack space to be exploited by fewer number of attack injection experiments. Using MODIFI, we then performed attack injection experiments on two of these vehicular Simulink models, a comfort control model and a brake-by-wire model, while elaborating on the results obtained

Place, publisher, year, edition, pages
2022. p. 130-140
Keywords [en]
fault injection, attack injection, cybersecurity testing, pre-injection analysis
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:ri:diva-61310DOI: 10.1109/PRDC55274.2022.00027ISBN: 978-1-6654-8555-5 (electronic)OAI: oai:DiVA.org:ri-61310DiVA, id: diva2:1715499
Conference
PRDC 2022
Available from: 2022-12-02 Created: 2022-12-02 Last updated: 2023-06-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Folkesson, PeterSangchoolie, BehroozKleberger, Pierre

Search in DiVA

By author/editor
Folkesson, PeterSangchoolie, BehroozKleberger, Pierre
By organisation
Electrification and Reliability
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 121 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf