6 SUMMARY AND FUTURE
WORK
In this paper we have presented the concept of pre-
dictive simulation used for enabling both: the run-
time assessment of a system or system component
trustworthiness and the needed self-reconfiguration in
case of malicious/ untrusted deviations. For enabling
the prediction of timing behavior that enables evalu-
ation of synchronization capabilities, we have intro-
duced a generic temporal model for the timing behav-
ior that can be used for evaluating timing deviation.
To this end, we have proposed a set of restrictive rules
on expected behavior by analyzing a set of open data
from an automotive use case. Our initial proof of con-
cept has been performed by iterating the model over
the behavior of the platoon in two safety-critical situ-
ation.
Ongoing work is directed towards reverse engi-
neering the behavior of single systems that can be
subject of the predictive simulation evaluation with
respect to timing considerations. Future work will go
into creation of models for enabling predictive evalu-
ation of the function interaction between system com-
ponents.
ACKNOWLEDGEMENTS
This work has been partially funded by Euro-
pean Funds for Regional Development (EFRE)
in context of ”Investment in Growth and Em-
ployment” (IWB) P1-SZ2-3 F&E: Technologieori-
entierte Kompetenzenfelder -MWVLW ”Neue Er-
probungskonzepte fuer sichere Software in hochau-
tomatisierten Nutzfahrzeugen” , by the European
Union’s Horizon 2020 research and innovation pro-
gramme under grant agreement No 952702 (BIECO)
and by ERDF/ESF ”CyberSecurity, CyberCrime and
Critical Information Infrastructures Center of Excel-
lence” (No. CZ.02.1.01/0.0/0.0/16
019/0000822).
REFERENCES
Autopilot (2022). Autopilot EU Project. https://autopilot-
project.eu/. [Online; accessed 03-April-2022].
Autosar (2021). AUTOSAR. https://www.autosar.org/.
[Online; accessed 11-August-2021].
Avi
ˇ
zienis, A., Laprie, J.-C., and Randell, B. (2004). De-
pendability and its threats: a taxonomy. In Building
the Information Society, pages 91–120. Springer.
Bauland, M., Schneider, T., Schnoor, H., Schnoor, I., and
Vollmer, H. (2007). The Complexity of Generalized
Satisfiability for Linear Temporal Logic. In Seidl, H.,
editor, Foundations of Software Science and Compu-
tational Structures, Lecture Notes in Computer Sci-
ence, pages 48–62, Berlin, Heidelberg. Springer.
Blanco, J. M., Rossi, B., and Pitner, T. (2021). A Time-
Sensitive Model for Data Tampering Detection for the
Advanced Metering Infrastructure. In Annals of Com-
puter Science and Information Systems, volume 25,
pages 511–519. ISSN: 2300-5963.
Bosch, J. (2015). Speed, data, and ecosystems: the future of
software engineering. IEEE Software, 33(1):82–88.
Bozzelli, L., K
ˇ
ret
´
ınsk
´
y, M.,
ˇ
Reh
´
ak, V., and Strej
ˇ
cek, J.
(2006). On Decidability of LTL Model Checking for
Process Rewrite Systems. In Arun-Kumar, S. and
Garg, N., editors, FSTTCS 2006: Foundations of Soft-
ware Technology and Theoretical Computer Science,
Lecture Notes in Computer Science, pages 248–259,
Berlin, Heidelberg. Springer.
Bry, A. and Roy, N. (2011). Rapidly-exploring random be-
lief trees for motion planning under uncertainty. In
2011 IEEE international conference on robotics and
automation, pages 723–730. IEEE.
Burgess, J. P. (1984). Basic Tense Logic. In Gabbay, D. and
Guenthner, F., editors, Handbook of Philosophical
Logic: Volume II: Extensions of Classical Logic, Syn-
these Library, pages 89–133. Springer Netherlands,
Dordrecht.
Calabr
`
o, A., Cioroaica, E., Daoudagh, S., and Marchetti,
E. (2022). Bieco runtime auditing framework. In
Gude Prego, J. J., de la Puerta, J. G., Garc
´
ıa Bringas,
P., Quinti
´
an, H., and Corchado, E., editors, 14th In-
ternational Conference on Computational Intelligence
in Security for Information Systems and 12th Interna-
tional Conference on European Transnational Educa-
tional (CISIS 2021 and ICEUTE 2021), pages 181–
191, Cham. Springer International Publishing.
Carvalho, T. P., Soares, F. A., Vita, R., Francisco, R. d. P.,
Basto, J. P., and Alcal
´
a, S. G. (2019). A systematic
literature review of machine learning methods applied
to predictive maintenance. Computers & Industrial
Engineering, 137:106024.
Cioroaica, E., Kuhn, T., and Buhnova, B. (2019). (do not)
trust in ecosystems. In 2019 IEEE/ACM 41st Inter-
national Conference on Software Engineering: New
Ideas and Emerging Results (ICSE-NIER), pages 9–
12. IEEE.
Hamon, R., Junklewitz, H., and Sanchez, I. (2020). Robust-
ness and explainability of artificial intelligence. Pub-
lications Office of the European Union.
Khan, F., Hashemi, S. J., Paltrinieri, N., Amyotte, P., Coz-
zani, V., and Reniers, G. (2016). Dynamic risk man-
agement: a contemporary approach to process safety
management. Current opinion in chemical engineer-
ing, 14:9–17.
Krupitzer, C., Roth, F. M., VanSyckel, S., Schiele, G.,
and Becker, C. (2015). A survey on engineering ap-
proaches for self-adaptive systems. Pervasive and Mo-
bile Computing, 17:184–206.
Lei, Y., Li, N., Guo, L., Li, N., Yan, T., and Lin, J. (2018).
Machinery health prognostics: A systematic review
ICSOFT 2022 - 17th International Conference on Software Technologies
338