Change search
Link to record
Permanent link

Direct link
Sangchoolie, BehroozORCID iD iconorcid.org/0000-0001-9536-4269
Publications (10 of 44) Show all publications
Malik, M., Sangchoolie, B. & Karlsson, J. (2025). A Security Benchmarking Approach for Cooperative Driving Automation (CDA) Applications.
Open this publication in new window or tab >>A Security Benchmarking Approach for Cooperative Driving Automation (CDA) Applications
2025 (English)In: Article in journal (Refereed) Accepted
Abstract [en]

This paper proposes a reference model for defining security benchmarks for the safety assessment of Cooperative Driving Automation (CDA) applications. Our reference model provides a systematic approach to benchmark the resilience of CDA applications against malicious attacks through extensive system simulations. It enables the test repeatability and comparison of results across different implementations of CDA applications. In our approach, a benchmark is defined as a series of tests that expose the target system to specific attacks while recording its response. Using this model, we define a benchmark for evaluating the resilience of Cooperative Adaptive Cruise Control (CACC) algorithms against barrage jamming attacks targeting the physical layer of the IEEE 802.11p communication standard. We apply this benchmark to assess and compare the performance of four CACC algorithms: P1, Flatbed, Ploeg, and Consensus. The benchmark measures reveal that the Consensus algorithm demonstrates the highest resilience against jamming attacks, primarily due to its heavy reliance on onboard sensors and the use of sensor data from all other vehicles for decision-making. In contrast, the P1 algorithm, which depends mainly on vehicle-to-vehicle (V2V) communication, proves to be the most vulnerable. Furthermore, the results indicate that vehicles are most susceptible to jamming attacks during acceleration phases, making these periods critical for security evaluation. These findings validate the effectiveness of our benchmarking framework in identifying strengths and vulnerabilities of CACC algorithms under cyberattacks.

Keywords
Reference Modeling, Security Benchmarks, Cooperative Driving Automation, Simulation-based testing, Jamming Attacks, Platooning System
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-78779 (URN)
Available from: 2025-09-05 Created: 2025-09-05 Last updated: 2025-09-23Bibliographically approved
Malik, M., Sangchoolie, B. & Karlsson, J. (2025). A Simulation-Based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications. Paper presented at 8th International Conference on Intelligent Transport Systems, INTSYS 2024. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 608 LNICST, 244-262
Open this publication in new window or tab >>A Simulation-Based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications
2025 (English)In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ISSN 1867-8211, E-ISSN 1867-822X, Vol. 608 LNICST, p. 244-262Article in journal (Refereed) Published
Abstract [en]

This paper presents our initial contributions toward defining security benchmarks for simulation-based assessment of Cooperative Driving Automation (CDA) applications. A security benchmark is a process or procedure for assessing and validating a system’s ability to achieve its operational objectives in the presence of specific security attacks. This work lays the groundwork for developing security benchmarks that assess the robustness of CDA applications against jamming attacks. The driving scenario and the attack model are the core components of our proposed security benchmark. We used two scenarios braking and sinusoidal as a stimulus for evaluating the robustness of a platooning application modeled in a simulation framework called Plexe. The platooning application is equipped with a Cooperative Adaptive Cruise Control (CACC) controller. We injected barrage jamming attacks into the physical layer of the wireless communication system modeled by the IEEE 802.11p protocol. We demonstrate that jamming attacks can compromise safety, leading to emergency braking and collision incidents among platooning vehicles. Our findings also indicate that the severity of jamming attacks varies with the driving scenario, with the most severe impacts (i.e., collisions) occurring when the attack is injected during vehicle acceleration. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2025
Keywords
Adaptive control systems; Automobile driver simulators; Benchmarking; Braking; Code division multiple access; Cooperative communication; Feedback control; Invariance; Jamming; Robustness (control systems); Attack modeling; Automation applications; Cooperative driving; Cooperative driving automation; Jamming attacks; Platooning system; Security attacks; Security benchmarks; Simulation-based jamming attack; Simulation-based security; Adaptive cruise control
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-78447 (URN)10.1007/978-3-031-86370-7_15 (DOI)2-s2.0-105002882586 (Scopus ID)
Conference
8th International Conference on Intelligent Transport Systems, INTSYS 2024
Available from: 2025-09-16 Created: 2025-09-16 Last updated: 2025-09-23Bibliographically approved
Folkesson, P., Sangchoolie, B., Pierre Kleberger, P., Nowdehi, N., Giantamidis, G., Tsachouridis, V. & Basagiannis, S. (2025). On the Reduction of Error Space for Model-Implemented Fault- and Attack Injection. IEEE Transactions on Dependable and Secure Computing, pp. 1-14
Open this publication in new window or tab >>On the Reduction of Error Space for Model-Implemented Fault- and Attack Injection
Show others...
2025 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, p. 1-14Article in journal, News item (Refereed) Published
Abstract [en]

Fault- and attack injection are techniques usedto measure dependability attributes of  omputer systems. Animportant property of such techniques is their efficiency inexploring the target system’s fault- or attack space. As this spaceis generally very large, pre-injection analysis techniques may beused to effectively explore the space. In this paper, we studytwo such techniques proposed in the past, namely inject-on-readand inject-on-write. Furthermore, we propose two new techniquescalled error space pruning of signals and error space pruning ofsignals and ports and evaluate their efficiency in reducing thespace needed to be explored by injection experiments. Thesetechniques were integrated into MODIFI, a fault- and attackinjector targeting Simulink models. To the best of our knowledge,we are the first to evaluate these pre-injection techniques for thiskind of injector.The results of our evaluation of 11 Simulink models from theautomotive domain and one from the avionics domain, show thatthe new proposed techniques reduce the fault- and attack spaceneeded to be explored by about 27–49%. Using MODIFI, we thenperformed injection experiments on two automotive models,  swell as an aero engine control model, while elaborating on theresults obtained.

Keywords
fault injection, attack injection, cybersecurity testing, pre-injection analysis, error space pruning
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-79072 (URN)10.1109/tdsc.2025.3625383 (DOI)
Available from: 2025-10-29 Created: 2025-10-29 Last updated: 2025-10-29
Avula, R. R., Mohamad, M., Sangchoolie, B. & Damschen, M. (2025). Towards Credible Simulators: A Validation Methodology for Safety-Critical Virtual Testing. In: Törngren, M., Gallina, B., Schoitsch, E., Troubitsyna, E., Bitsch, F. (Ed.), Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops: . Paper presented at SAFECOMP 2025. , 15955
Open this publication in new window or tab >>Towards Credible Simulators: A Validation Methodology for Safety-Critical Virtual Testing
2025 (English)In: Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops / [ed] Törngren, M., Gallina, B., Schoitsch, E., Troubitsyna, E., Bitsch, F., 2025, Vol. 15955Conference paper, Published paper (Refereed)
Abstract [en]

Recent advances in high-performance graphics and physics engines (e.g., Unreal Engine) have popularized simulators for safety-critical system testing, yet credible validation is essential for reliable outcomes. This paper introduces a novel methodology for validating simulation toolchains, combining principles from SAE and UNECE frameworks with validation cycles to accommodate evolving safety-critical requirements. We demonstrate this approach through a case study evaluating the color fidelity of an Unreal Engine-based perception toolchain for safety-critical applications such as human and obstacle detection. Comparative tests of real and simulated camera outputs show that Unreal Engine’s camera model achieves "Delta E" < 4 under controlled lighting, closely matching the reference colors, but complex real-world lighting and seasonal variations can introduce perceivable color discrepancies. Our iterative methodology enables progressive refinements (reducing "Delta E" variations) and establishes critical traceability links for assessors related to evolving system requirements, toolchain modifications, as well as validation evidence. The resulting framework provides assessors with a verifiable chain of evidence from initial discrepancies to compliance, bridging the gap between adaptive development and certification needs.

Keywords
Simulation validation, Safety-critical systems, Virtual testing toolchain, Unreal engine, Camera model fidelity
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:ri:diva-78760 (URN)10.1007/978-3-032-02018-5_12 (DOI)978-3-032-02017-8 (ISBN)978-3-032-02018-5 (ISBN)
Conference
SAFECOMP 2025
Funder
EU, Horizon Europe
Available from: 2025-08-25 Created: 2025-08-25 Last updated: 2025-09-23Bibliographically approved
Malik, M., Sangchoolie, B. & Karlsson, J. (2024). A Simulation-based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications. Paper presented at EAI International Conference on Intelligent Transport Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Open this publication in new window or tab >>A Simulation-based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications
2024 (English)In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications EngineeringArticle in journal (Refereed) Published
Abstract [en]

This paper presents our initial contributions toward defining security benchmarks for simulation-based assessment of Cooperative Driving Automation (CDA) applications. A security benchmark is a process or procedure for assessing and validating a system’s ability to achieve its operational objectives in the presence of specific security attacks. This work lays the groundwork for developing security benchmarks that assess the robustness of CDA applications against jamming attacks. The driving scenario and the attack model are the core components of our proposed security benchmark. We used two scenarios braking and sinusoidal as a stimulus for evaluating the robustness of a platooning application modeled in a simulation framework called Plexe. The platooning application is equipped with a Cooperative Adaptive Cruise Control (CACC) controller. We injected barrage jamming attacks into the physical layer of the wireless communication system modeled by the IEEE 802.11p protocol. We demonstrate that jamming attacks can compromise safety, leading to emergency braking and collision incidents among platooning vehicles. Our findings also indicate that the severity of jamming attacks varies with the driving scenario, with the most severe impacts (i.e., collisions) occurring when the attack is injected during vehicle acceleration.

Keywords
Security benchmarks, Cooperative Driving Automation (CDA), Simulation-based jamming attacks, Platooning system
National Category
Computer Systems Communication Systems
Identifiers
urn:nbn:se:ri:diva-76081 (URN)10.1007/s11036-025-02460-x (DOI)
Conference
EAI International Conference on Intelligent Transport Systems
Note

The work of this paper has been partly done in the context ofthe SUNRISE project, funded by the European Union’s Horizon Europe Research andInnovation Actions under grant agreement no.101069573. 

Available from: 2024-11-18 Created: 2024-11-18 Last updated: 2025-09-23Bibliographically approved
Maleki, M., Farooqui, A. & Sangchoolie, B. (2023). CarFASE: A Carla-based Tool for Evaluating the Effects of Faults and Attacks on Autonomous Driving Stacks. In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W): . Paper presented at 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 92-99). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>CarFASE: A Carla-based Tool for Evaluating the Effects of Faults and Attacks on Autonomous Driving Stacks
2023 (English)In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 92-99Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents CarFASE, an open-source carla-based fault and attack simulation engine that is used to test and evaluate the behavior of autonomous driving stacks in the presence of faults and attacks. Carla is a highly customizable and adaptable simulator for autonomous driving research. In this paper, we demonstrate the application of CarFASE by running fault injection experiments on OpenPilot, an open-source advanced driver assistance system designed to provide a suite of features such as lane keeping, adaptive cruise control, and forward collision warning to enhance the driving experience. A braking scenario is used to study the behavior of OpenPilot in the presence of brightness and salt&pepper faults. The results demonstrate the usefulness of the tool in evaluating the safety attributes of autonomous driving systems in a safe and controlled environment.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-66359 (URN)10.1109/dsn-w58399.2023.00036 (DOI)
Conference
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
Note

This work was supported by VALU3S project, which has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey

Available from: 2023-09-05 Created: 2023-09-05 Last updated: 2025-09-23Bibliographically approved
Malik, M., Aramrattana, M., Maleki, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2023). Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC: . Paper presented at 28th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2023. Singapore. 24 October 2023 through 27 October 2023 (pp. 23-29). IEEE Computer Society
Open this publication in new window or tab >>Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
Show others...
2023 (English)In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, IEEE Computer Society , 2023, p. 23-29Conference paper, Published paper (Refereed)
Abstract [en]

A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification. 

Place, publisher, year, edition, pages
IEEE Computer Society, 2023
Keywords
Control system synthesis; Denial-of-service attack; Failure (mechanical); Remote control; Safety engineering; Software testing; Vehicle to vehicle communications; Vehicle transmissions; Communication failure; Control software; Denialof- service attacks; Remote location; Remotely operated road vehicle; Road vehicles; Safety mechanisms; Software in the loops; Software-in-the-loop testing; Transmission delays; Specifications
National Category
Mechanical Engineering
Identifiers
urn:nbn:se:ri:diva-70583 (URN)10.1109/PRDC59308.2023.00012 (DOI)2-s2.0-85182390657 (Scopus ID)
Conference
28th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2023. Singapore. 24 October 2023 through 27 October 2023
Note

This work was supported by VALU3S project, which hasreceived funding from the ECSEL Joint Undertaking (JU)under grant agreement No 876852. We also would like toexpress our sincere gratitude to Stepan Kar ´ asek and Beata Davidova from Roboauto, who provided us with invaluable ´support to test their system in the simulation environment.

Available from: 2024-01-22 Created: 2024-01-22 Last updated: 2025-09-23Bibliographically approved
Malik, M., Aramrattana, M., Maleki, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2023). Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks. In: 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023): . Paper presented at Pacific Rim International Symposium on Dependable Computing. IEEE conference proceedings
Open this publication in new window or tab >>Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
Show others...
2023 (English)In: 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023), IEEE conference proceedings, 2023Conference paper, Published paper (Other academic)
Abstract [en]

A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2023
Keywords
remotely operated road vehicle (RORV), communication failures, denial-of-service (DoS) attacks, safety mechanisms, software-in-the-loop (SIL) testing
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-67577 (URN)
Conference
Pacific Rim International Symposium on Dependable Computing
Available from: 2023-10-31 Created: 2023-10-31 Last updated: 2025-09-23Bibliographically approved
Smrčka, A., Sangchoolie, B., Mingozzi, E., de la Vara, J. L., Farrell, M., Barbosa, R., . . . Kanak, A. (2023). Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. Open Research Europe, 3
Open this publication in new window or tab >>Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems
Show others...
2023 (English)In: Open Research Europe, E-ISSN 2732-5121, Vol. 3Article in journal (Refereed) Published
Abstract [en]

Verification and validation (V&V) are complex processes combining different approaches and incorporating many different methods including many activities. System engineers regularly face the question if their V&V activities lead to better products, and having appropriate criteria at hand for evaluation of safety and cybersecurity of the systems would help to answer such a question. Additionally, when there is a demand to improve the quality of an already managed V&V process, there is a struggle over what criteria to use in order to measure the improvement. This paper presents an extensive set of criteria suitable for safety and cybersecurity evaluation of cyberphysical systems. The evaluation criteria are agreed upon by 60 researchers from 32 academic and industrial organizations jointly working in a large-scale European research project on 13 real-world use cases from the domains of automotive, railway, aerospace, agriculture, healthcare, and industrial robotics.

Keywords
criteria, evaluation, verification, validation, safety, cybersecurity, cyber-physical system (CPS)
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-61310 (URN)10.12688/openreseurope.16234.1 (DOI)978-1-6654-8555-5 (ISBN)
Funder
EU, Horizon Europe, 876852
Available from: 2022-12-02 Created: 2024-05-13 Last updated: 2025-09-23Bibliographically approved
Farooqui, A. & Sangchoolie, B. (2023). Towards Formal Fault Injection for Safety Assessment of Automated Systems. In: Fifth International Workshop on Formal Methods for Autonomous Systems: . Paper presented at International Workshop on Formal Methods for Autonomous Systems.
Open this publication in new window or tab >>Towards Formal Fault Injection for Safety Assessment of Automated Systems
2023 (English)In: Fifth International Workshop on Formal Methods for Autonomous Systems, 2023Conference paper, Published paper (Refereed)
Abstract [en]

Reasoning about safety, security, and other dependability attributes of autonomous systems is a challenge that needs to be addressed before the adoption of such systems in day-to-day life. Formal methods is a class of methods that mathematically reason about a system’s behavior. Thus, a correctness proof is sufficient to conclude the system’s dependability. However, these methods are usually applied to abstract models of the system, which might not fully represent the actual system. Fault injection, on the other hand, is a testing method to evaluate the dependability of systems. However, the amount of testing required to evaluate the system is rather large and often a problem. This vision paper introduces formal fault injection, a fusion of these two techniques throughout the development lifecycle to enhance the dependability of autonomous systems. We advocate for a more cohesive approach by identifying five areas of mutual support between formal methods and fault injection. By forging stronger ties between the two fields, we pave the way for developing safe and dependable autonomous systems. This paper delves into the integration’s potential and outlines future research avenues, addressing open challenges along the way.

Keywords
Fault injection, formal methods
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-67578 (URN)
Conference
International Workshop on Formal Methods for Autonomous Systems
Note

This work was partly supported by the VALU3S project, which has received funding from the ECSEL Joint Undertaking(JU) under grant agreement No 876852. The JU receives support from the European Union’s Horizon 2020 research andinnovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey. This work hasalso been partly financed by the CyReV project, which is funded by the VINNOVA FFI program – the Swedish GovernmentalAgency for Innovation Systems (Diary number: 2019-03071).

Available from: 2023-10-31 Created: 2023-10-31 Last updated: 2025-09-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9536-4269

Search in DiVA

Show all publications