Assessing aircraft security: A comprehensive survey and methodology for evaluation

E Habler, R Bitton, A Shabtai - ACM Computing Surveys, 2023 - dl.acm.org
The sophistication and complexity of cyber attacks and the variety of targeted platforms have
grown in recent years. Adversaries are targeting a wide range of platforms, eg, enterprise …

Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research

A Costin, S Khandker, H Turtiainen… - arXiv preprint arXiv …, 2023 - arxiv.org
COSPAS-SARSAT is an International programme for" Search and Rescue"(SAR) missions
based on the" Satellite Aided Tracking" system (SARSAT). It is designed to provide accurate …

On the (in) security of 1090ES and UAT978 mobile cockpit information systems–an attacker perspective on the availability of ADS-B safety-and mission-critical …

S Khandker, H Turtiainen, A Costin… - IEEE Access, 2022 - ieeexplore.ieee.org
Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology
and a critical component of next-generation air transportation systems. It significantly …

Towards a unified cybersecurity testing lab for satellite, aerospace, avionics, maritime, drone (SAAMD) technologies and communications

A Costin, H Turtiainen, S Khandker… - arXiv preprint arXiv …, 2023 - arxiv.org
Aviation, maritime, and aerospace traffic control, radar, communication, and software
technologies received increasing attention in the research literature over the past decade …

On Apache Log4j2 exploitation in aeronautical, maritime, and aerospace communication

A Juvonen, A Costin, H Turtiainen… - IEEE Access, 2022 - ieeexplore.ieee.org
Apache Log4j2 is a prevalent logging library for Java-based applications. In December
2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228 …

Building an avionics laboratory for cybersecurity testing

M Strohmeier, G Tresoldi, L Granger… - Proceedings of the 15th …, 2022 - dl.acm.org
Aviation cybersecurity has received significant attention in the academic literature over the
past decade, as software-defined radios have enabled practical wireless attacks on …

An industrial network traffic anomaly detection method based on improved DeepFM model

J Qian, T Jia, W Zhang, K Zeng, X Du - IEEE Access, 2024 - ieeexplore.ieee.org
Aiming to address the issue of low accuracy in industrial network traffic anomaly detection,
we propose an improved DeepFM model for multi-type anomaly detection. The dataset …

A Fuzz Testing Approach for Embedded Avionic Software

L Xompero, T Mohammad, J Isoaho, J Grossi - Procedia Computer Science, 2024 - Elsevier
The objective of the research was to find if it was possible to apply fuzz testing, a technique
that can be used to test software to discover vulnerabilities, on an embedded avionic …