A battery cannot get healthier as it ages. This is a consequence of irreversible electrochemical processes. Any reported trajectory that claims otherwise is geometrically impossible — and the MW manifold says so, regardless of which vendor's firmware produced it.
EV Fleet BMS — MW Manifold Analysis
For three decades, cybersecurity has been built to catch process violations. The next generation of critical infrastructure threats are semantic — attacks designed by people who understand the physics well enough to manipulate reported state while the system degrades silently.
Breaks in, moves laterally, exfiltrates. Does something your infrastructure was not designed to permit. Firewalls, EDR, SIEM, OT monitors — all alarm systems for unauthorised process activity. Current tools catch this well.
Does not break into your filing cabinet. Reads the rules, understands what the system is designed to achieve, then — working entirely within permitted process — constructs data that is formally compliant but designed with precise knowledge of the outcome it will produce. No single value breaches any threshold.
None of today's OT tools ask: Is the meaning of this data consistent with the physical laws of the system that produced it? The MW manifold asks exactly this — and answers it geometrically.
We designed this attack from the physics upward, against real Indian EV fleet telemetry, to understand precisely what a sophisticated actor with deep BMS knowledge could construct — and whether MW could catch it.
Compromised firmware slightly elevated reported cell voltages under load, making the resistance-driven voltage drop appear smaller than reality. Monitoring software computed falsely low resistance.
The degradation signal would disappear entirely while cells continued aging toward thermal threshold.
Inflated the Full Capacity field gradually — at a rate indistinguishable from normal measurement variance — directly inflating reported SOH without touching any voltage or temperature value.
Every threshold-based check passed. The asset appeared healthy earning full capacity market payments while physical cells degraded on their real schedule.
Target cells walked toward higher voltage states at a rate so small — fractions of a millivolt per interval — that no trend monitoring or daily operations review would observe it.
Over weeks: real physical imbalance, lithium plating risk, accelerated thermal stress. The trigger remained the attacker's to choose.
SOC residual: 0.02 ✅ confirmed
current residual: 0.03 ✅ confirmed
IR residual: 0.38 ⚠ suppression detected
→ resistance lower than electrochemistry permits
SOH residual: HIGH ✗ physically impossible
→ Full Capacity: 108 Ah on 100 Ah rated pack
→ Reported SOH: 105.6% — impossible for any
LFP chemistry under any operating condition
Voltage drift layer: ATTACK CONFIRMED
→ Cells 6 & 12 precisely identified from 16
→ No BMS threshold fired. No network anomaly.
→ Geometry powered by physics caught it.
Claroty, Dragos, Nozomi at network layer; SCADA and EMS at application layer; BMS threshold monitors at device layer — all share one assumption: data format and source authenticity are sufficient proxies for data integrity. They never ask whether data meaning is consistent with physical law.
The MW manifold maintains a Bayesian belief about where the battery state should sit on the electrochemical manifold. A trajectory moving sideways or upward — as no electrochemical process could produce — is detected as a geometric impossibility, not a statistical outlier.
You cannot compromise electrochemistry with a software update.
The most consequential OT cyberattack on record was almost a semantic attack. Stuxnet commanded centrifuges to spin at destructive frequencies while reporting healthy operation to every monitoring surface. SCADA showed normal. Safety systems showed normal. Operators watched a lie while the physical system destroyed itself on schedule.
The weapon was meaning, not malware — and no tool of that era asked whether the reported operational state was geometrically consistent with what centrifuge physics permits.
The same geometric consistency verification architecture works across any domain with a valid physical state manifold. Only the priors change.
Real-time manifold monitoring of cell-level electrochemistry across entire fleets. Detect impossible degradation patterns before thermal failure.
Market payment fraud detection via SOH inflation. Physics-grounded capacity reporting verification independent of firmware vendor.
Coolant flow reporting consistency verification against thermodynamic manifold. Semantic attack detection on safety-critical systems.
Pressure telemetry geometric consistency against fluid dynamics manifold. Detect manipulated sensor data before infrastructure failure.
Control surface data verification against aerodynamics manifold. Detect physically impossible reported states in flight-critical systems.
If you operate Battery Energy Storage Systems, EV fleets, grid infrastructure, or any physical system with known electrochemical or thermodynamic constraints — let us show you what your current tools are missing.