Model-Implemented Fault/Attack Injection with Pre-Injection Analysis (MIFI_MIAI)

The MIFI_MIAI workflow describes the application of the V&V methods MIFI (Model-Implemented Fault Injection with Pre-injection Analysis) and MIAI (Model-Implemented Attack Injection with Pre-injection Analysis). These methods allow fault- and attack injection mechanisms implemented as model blocks to be injected into simulated target system models to evaluate the impact of faults and cybersecurity attacks on target systems at early development phases.

The workflow has four inputs: Simulink system model, Stimuli, Fault/Attack Model Library and Requirements. There is also one output: the Fault/Attack Injection Results.

The sequence of main activities included in the worklow are:

  • Analyse Model Structure: The target Simulink system model is analysed to determine the fault/attack space structure.
  • Perform Golden Run: The target Simulink system model is simulated with the chosen Stimuli and monitored to obtain the nominal (fault/attack free) behaviour.
  • Pre-injection Analysis: The target Simulink system model fault/attack space structure and nominal behaviour is analysed to reduce the fault/attack space..
  • Configure Campaign: The campaign of fault- and attack injections to conduct on the target Simulink system model is configured. The target system Requirements and Stimuli to use for the simulations determines the set of faults and attacks to inject including their locations, activation times and durations.
  • Inject Fault/Attack: The faults and attacks  are injected into the target Simulink system model according to the campaign configuration.
  • Run Simulation: The target Simulink system model injected according to the campaign configuration is simulated with the chosen stimuli and the target system behaviour is monitored.
  • Analyse Fault/Attack Injection Results: The monitored data obtained during simulations of the golden run and fauilt injected target Simulink system model is analysed based on the Requirements to report the Fault/Attack Injection Results of the campaign performed.

Extensible Markup Language (XML) MIFI_MIAI.xml — Extensible Markup Language (XML), 439 KB
Contents

There are currently no items in this folder.