The approach
The FORESEEN methodology is based on the following steps:
Steps (2)-(5) are the formal methods-based part of our methodology and can be repeated until the required level of robustness is reached. In the following image is presented a schematic representation of the proposed approach.
FORESEEN methodology schema
Once the CPS model has been generated, we proceed to the identification of the safety-critical physical devices, namely sensors and
actuators, which are directly responsible for the vehicle control. Then we are able to design attack scenarios, and run the
co-simulation in case of attacks. In particular:
Once the attack has been implemented and added to the co-simulation, a set of run with and without the attacks are executed. The data related to the state evolution of the system, which are called traces, are collected. Given the complexity and width of the search space, we adopt an incremental approach, by first producing traces where simple attacks are injected and subsequently create more and more complex attack scenarios. This approach allows us to generate traces in more controlled environment, while at the same time helping the building and validation of formal models.
After the generation of the formal models and the definition of the attack properties, the properties are verified on the driving system models, as shown in the figure below. This is accomplished by using a formal verification environment, that acts as a classificator.
Model checking technology