From: Deriving invariant checkers for critical infrastructure using axiomatic design principles
No. | Test category | Target component(s) | Launch state | Attack intent and description |
---|---|---|---|---|
10 | SAOS | Water pipes | At time t, 1-LT-001 is at Low or LowLow, 1-MV-005 is open and 1-MV-001 is turned off (Fig. 12) | Damage the pipes of WADI by increasing water pressure. At time t++, an attacker manually turns on 1-MV-001 |
11 | SAOS | 2-LT-001 | At time t, 2-LT-001 is at High or HighHigh, and 2-MV-001 is closed (Fig. 13) | Overflow the tank, 2-LT-001. At time t++, an attacker opens 2-MV-001. |
12 | MAOS | 2-LT-002 | At time t, 2-LT-002 is at High or HighHigh, 1-P-005 is not turned on, and 2-MV-003 is not opened (Fig. 13) | Overflow the tank, 2-LT-002. At time t++, an attacker turns on 1-P-005 and 2-MV-003 |
13 | MAOS | 2-LT-002 | At time t, 2-LT-002 is at High or HighHigh, 1-P-005 and 1-P-006 are not turned on, and 2-MV-003 is closed (Fig. 13) | Overflow the tank, 2-LT-002. At time t++, an attacker turns on 1-P-006 and 2-MV-003 |