Abstract
Autonomous robotic systems systems are both safety- and security-critical, since a breach in system security may impact safety. In such critical systems, formal verification is used to model the system and verify that it obeys specific functional and safety properties. Independently, threat modelling is used to analyse and manage the cyber security threats that such systems may encounter. Both verification and threat analysis serve the purpose of ensuring that the system will be reliable, albeit from differing perspectives. In prior work, we argued that these analyses should be used to inform one another and, in this paper, we extend our previously defined methodology for security-minded verification by incorporating runtime verification. To illustrate our approach, we analyse an algorithm for sending Cooperative Awareness Messages between autonomous vehicles. Our analysis centres on identifying STRIDE security threats. We show how these can be formalised, and subsequently verified, using a combination of formal tools for static aspects, namely Promela/SPIN and Dafny, and generate runtime monitors for dynamic verification. Our approach allows us to focus our verification effort on those security properties that are particularly important and to consider safety and security in tandem, both statically and at runtime.
Original language | English |
---|---|
Number of pages | 18 |
Journal | IEEE Transactions on Dependable and Secure Computing |
Early online date | 21 Dec 2023 |
DOIs | |
Publication status | E-pub ahead of print - 21 Dec 2023 |
Bibliographical note
Work supported by the Royal Academy of Engineering and UKRI via the Trustworthy Autonomous Systems Nodes on Security [EP/V026763/1] and Verifiability[EP/V026801/2]and the FAIR-SPACE Hub[EP/R026092]Data Availability Statement
Artefacts can be found at https://github.com/autonomy-and-verification/security-minded-verificationKeywords
- Computer crime
- Connected Autonomous Vehicles
- Cooperative Awareness Messages
- Monitoring
- Protocols
- Runtime
- Safety
- Security
- Threat modeling
- Threat Modelling
- Verification