Experimental validation of architectural solutions
This task will validate some of the trusted run-time components of the architecture to determine if they can actually prevent attacks or tolerate intrusions perpetrated by malicious adversaries located within one of the infrastructures. An experimental approach will be used to accomplish this validation. Attack injection tools will be built or extended with new modules to attend the specificity of the target components.
The tools will be composed be different parts and will implement different mechanisms to simulate distinct classes of attack patterns. A workload generator will be responsible for taking the target component through different states. The different kinds of attacks will be performed by the injector module. A monitor and data collector will obtain information about the behaviour of the software after it has been attacked. The statistical analyser will produce reports about the outcome of the experiments.