Threat-Oriented Digital Twinning for Autonomous Security Evaluation
A novel approach for assessing cybersecurity in learning-enabled autonomous systems employs threat-oriented digital twinning. This open-source, modular twin simulates a standard autonomy stack, incorporating distinct functions for sensing, autonomy, and supervisory control, alongside confidence-gated multi-modal perception, clear trust boundaries for commands and telemetry, and runtime hold-safe behavior. The methodology converts threat assessments into tests addressing spoofing, replay, malformed input injection, reduced sensing capabilities, and adversarial machine learning stress. Although it has been applied to a ground-based proxy, the framework is centered around the autonomy stack. The research, available on arXiv (2604.25757), seeks to foster open, unclassified studies on secure autonomy through a reproducible design pattern.
Key facts
- Methodology uses threat-oriented digital twinning for cybersecurity evaluation of autonomous platforms.
- Open-source, modular twin includes separated sensing, autonomy, and supervisory-control functions.
- Features confidence-gated multi-modal perception and explicit trust boundaries.
- Tests cover spoofing, replay, malformed-input injection, degraded sensing, and adversarial ML stress.
- Implemented on a ground-based proxy but architecture is stack-framed.
- Published on arXiv with ID 2604.25757.
- Aims to enable open, unclassified research on secure autonomy.
- Provides a reproducible design pattern for threat analysis translation.
Entities
Institutions
- arXiv