MODIFI

The MODIFI (MODel-Implemented Fault- and attack Injection) tool supports model-implemented fault- and attack injection methods within the MATLAB/Simulink environment allowing the impact of faults and cybersecurity attacks on target systems to be evaluated at early development phases.
Improved

The MODIFI tool supports model-implemented fault- and attack injection methods within the MATLAB/Simulink environment. These methods allow fault- and attack injection mechanisms implemented as model blocks to be injected into simulated target system models to evaluate the impact of faults and cybersecurity attacks and safety- and/or cybersecurity mechanisms to be tested at early development phases. The injection experiments are configured and controlled via a graphical user interface in MODIFI. Several automatic pre-injection analyses, aimed at reducing the number of fault- and attack injection experiments needed to perform the evaluations, can be applied during the configuration.

The MODIFI tool has been extended to include several automatic pre-injection analysis techniques to reduce the fault- and attack locations in the target system model, thus reducing the time, cost and effort of performing the fault- and attack injection experiments. These techniques include inject-on-read, inject-on-write and error space pruning pre-injection analyses. Each technique is implemented as a function in the MODIFI configuration module which may be executed by the user in the MODIFI GUI to analyse the target system model structure and reduce the locations where the faults and attacks may be injected.

R. Svenningsson, J. Vinter, H. Eriksson, and M. T ̈orngren, “Modifi: A model- implemented fault injection tool,” in Proc. of the 29th Int. Conf. on Computer Safety, Reliability, and Security, ser. SAFECOMP’10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 210–222.

B. Sangchoolie, P. Folkesson, and J. Vinter, “A study of the interplay between safety and security using model-implemented fault injection,” in 2018 14th Eur. Dep. Comp. Conf. (EDCC). IEEE, 2018, pp. 41–48.

Relationships with other web-repo artefacts
Improvement Classification
Error Coverage
Time of execution, Number of test cases, Joint management of SCP requirements
Open source - Goals
No
Cybersecurity, Safety
Contents

There are currently no items in this folder.