This Article 
 Bibliographic References 
 Add to: 
Potential Attacks on Onboard Aerospace Systems
July-Aug. 2012 (vol. 10 no. 4)
pp. 71-74
Yves Deswarte, LAAS-CNRS
Éric Alata, LAAS-CNRS
Vincent Nicomette, LAAS-CNRS
Because security is becoming a major concern for aircraft manufacturers and satellite makers, vulnerability discovery and countermeasures should be integrated into onboard computing systems early during their development. Attacks against aerospace computer systems fall into two main classes. One aims to corrupt the computing system's core functions; the other targets fault-tolerance mechanisms (error detection and recovery).

1. Commercial Aircraft Information Security Concepts of Operation and Process Framework, report 811, ARINC, Dec. 2005.
2. Software Considerations in Airborne Systems and Equipment Certification, DO-178-C, RTCA/EuroCAE, Dec. 2011.
3. E. Jaeger and T. Hardin, “A Few Remarks about Formal Development of Secure Systems,” Proc. 11th High-Assurance Systems Eng. Symp. (HASE 08), IEEE, 2008, pp. 165–174.
4. O. Sibert, P.A. Porras, and R. Lindell, “The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems,” Proc. IEEE Symp. Security and Privacy, IEEE, 1995, pp. 211–222.
5. F. Lone Sang et al., “Exploiting an I/OMMU Vulnerability,” Proc. 5th Int'l Conf. Malicious and Unwanted Software (Malware 10), IEEE, 2010, pp. 7–14.
6. L. Duflot, O. Levillain, and B. Morin, “ACPI: Design Principles and Concerns,” Proc. 2nd Int'l Conf. Trusted Computing (Trust 09), LNCS 5471, Springer, 2009, pp. 14–28.
7. A. Avizienis et al., “Basic Concepts and Taxonomy of Dependable and Secure Computing,” IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, 2004, pp. 11–33.

Index Terms:
computer security,aerospace computing systems,embedded systems,software vulnerabilities,hardware vulnerabilities,core functions,fault tolerance
Anthony Dessiatnikoff, Yves Deswarte, Éric Alata, Vincent Nicomette, "Potential Attacks on Onboard Aerospace Systems," IEEE Security & Privacy, vol. 10, no. 4, pp. 71-74, July-Aug. 2012, doi:10.1109/MSP.2012.104
Usage of this product signifies your acceptance of the Terms of Use.