the reduction in the number of needed enriched mod-
els while still correctly assessing safety, security and
performance impacts. We will also investigate the au-
tomation of the enrichment stage. Furthermore, we
will work on the identification of the links between
the two modeling views. Regarding the assessment
stage, the security assessment of more complex attack
scenarios, the automated generation of properties and
the design of metrics allowing to easily compare the
verification and simulation results are three improve-
ment perspectives we intend to explore. Finally, we
intend to evaluate the method on other case-studies
that can help in comparing the assessment results with
the impacts observed on real systems.
ACKNOWLEDGEMENTS
This work has been funded by the EU H2020 project
SPARTA. We gratefully thank Fortiss and Yuri Gil
Dantas for their kind help and support.
REFERENCES
Apvrille, L. and Li, L. W. (2019). Harmonizing safety, secu-
rity and performance requirements in embedded sys-
tems. In 2019 Design, Automation & Test in Europe
Conference & Exhibition (DATE), pages 1631–1636.
IEEE.
Apvrille, L., Muhammad, W., Ameur-Boulifa, R., Coud-
ert, S., and Pacalet, R. (2006). A uml-based environ-
ment for system design space exploration. In 2006
13th IEEE International Conference on Electronics,
Circuits and Systems, pages 1272–1275. IEEE.
Apvrille, L. and Roudier, Y. (2013). SysML-Sec: A SysML
Environment for the Design and Development of Se-
cure Embedded Systems. In APCOSEC 2013, Yoko-
hama, Japan.
Behrmann, G., David, A., and Larsen, K. G. (2004). A
tutorial on uppaal. Formal methods for the design of
real-time systems, pages 200–236.
Blanchet, B. (2001). An Efficient Cryptographic Proto-
col Verifier Based on Prolog Rules. In 14th IEEE
Computer Security Foundations Workshop (CSFW-
14), pages 82–96, Cape Breton, Nova Scotia, Canada.
IEEE Computer Society.
Brykczynski, B. and Small, R. A. (2003). Reducing
internet-based intrusions: Effective security patch
management. IEEE software, 20(1):50–57.
Calvino, A. T. and Apvrille, L. (2021). Direct model-
checking of sysml models.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on Information Theory,
29(2):198–208.
Dupont, S., Maroneze, A., Massonnet, P., Nigam, V., Plate,
H., Sykosch, A., Cakmak, E., Thanasis, S., Jim
´
enez,
V., Amparan, E., Martinez, C., L
´
opez, A., Garc
´
ıa-
Alfaro, J., Segovia, M., Rubio-Hernan, J., Blanc, G.,
Debar, H., Carbone, R., Ranise, S., Verderame, L.,
Spaziani-Brunella, M., Yautsiukhin, A., Morgagni,
A., Klein, J., Bissyande, T., and Samhi, J. (2020). As-
sessment specifications and roadmap. Technical re-
port.
Enrici, A., Apvrille, L., and Pacalet, R. (2017). A model-
driven engineering methodology to design parallel and
distributed embedded systems. ACM Transactions on
Design Automation of Electronic Systems (TODAES),
22(2):1–25.
Garmin (2016). Lidar lite v3 operation manual and techni-
cal specifications. Technical report.
Gonzalez-Granadillo, G., Garcia-Alfaro, J., Alvarez, E., El-
Barbori, M., and Debar, H. (2015). Selecting opti-
mal countermeasures for attacks against critical sys-
tems using the attack volume model and the rori index.
Computers & Electrical Engineering, 47:13–34.
Li, L. (2018). Safe and secure model-driven design for em-
bedded systems. PhD thesis, Universit
´
e Paris-Saclay.
L
´
ucio, L., Kanav, S., Bayha, A., and Eder, J. (2018). Con-
trolling a virtual rover using AutoFOCUS3. In Pro-
ceedings of the MDETools Workshop co-located with
MODELS 2018, volume 2245 of CEUR Workshop
Proceedings, pages 356–365.
Lugou, F., Li, L. W., Apvrille, L., and Ameur-Boulifa,
R. (2016). Sysml models and model transformation
for security. In 2016 4th International Conference
on Model-Driven Engineering and Software Develop-
ment (MODELSWARD), pages 331–338. IEEE.
Martinez, C., Maroneze, A., Massonnet, P., Dupont, S.,
Grandclaudon, J., Nigam, V., Dantas, Y.-G., Plate,
H., Sykosch, A., Ohm, M., Cakmak, E., Athanasios,
S., Jim
´
enez, V., Amparan, E., L
´
opez, A., Apvrille,
L., Blanc, G., Debar, H., Bisegna, A., Carbone, R.,
Verderame, L., Ranise, S., Bernardinetti, G., Palam
`
a,
I., Pellegrini, A., Restuccia, G., Sirbu, G., Yaut-
siukhin, M. S.-B. A., Poretti, C., Klein, J., and Samhi,
J. (2021). Demonstrators specifications. Technical re-
port.
Nespoli, P., Papamartzivanos, D., M
´
armol, F. G., and Kam-
bourakis, G. (2017). Optimal countermeasures selec-
tion against cyber attacks: A comprehensive survey on
reaction frameworks. IEEE Communications Surveys
& Tutorials, 20(2):1361–1396.
Nicol, D. (2005). Modeling and simulation in security eval-
uation. IEEE Security & Privacy, 3(5):71–74.
Sultan, B. (2020). Ma
ˆ
ıtrise des correctifs de s
´
ecurit
´
e pour
les syst
`
emes navals. PhD thesis, Ecole nationale
sup
´
erieure Mines-T
´
el
´
ecom Atlantique Bretagne Pays
de la Loire.
Sultan, B., Dagnat, F., and Fontaine, C. (2018). A method-
ology to assess vulnerabilities and countermeasures
impact on the missions of a naval system. In Com-
puter Security, pages 63–76, Cham. Springer Interna-
tional Publishing.
MODELSWARD 2022 - 10th International Conference on Model-Driven Engineering and Software Development
60