Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.1.5

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack  

Hong, Byoung-jin (Ajou University Dept. of NCW)
Kim, Wan-ju (Ajou University Dept. of NCW)
Kim, Ho-keun (Ajou University Dept. of NCW)
Lim, Jae-sung (Ajou University Dept. of NCW)
Abstract
Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.
Keywords
RTOS; Data Modulation Attack; True-Airspeed; Air Data Computer; Detection Module;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Marcusson, Lief, "The Sponsor'S Overview of an it Project, According to it Project Managers Opinion", Journal of Economics and Management Sciences, vol. 1, no. 1, pp. 65-77, May. 2018.   DOI
2 Snyder, Don et. al., "Cybersecurity of Air Force Weapon Systems: Ensuring Cyber Mission Assurance Throughout a System's Life Cycle", Rand Corporation, Oct. 2015.
3 Waheed, Mohammed and Michael Cheng, "A system for real-time monitoring of cybersecurity events on aircraft," Digital avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. IEEE, pp.1-3, Nov. 2017.
4 Koch, Robert and Mario Golling, "Weapons systems and cyber security -a challenging union," 2016 8th interna tional Conference on Cyber Conflict (CyCon), pp. 191-203, June 2016.
5 Korea Internet & Security Agency, Software Development Security Guide for e-Government SW Developers/Operators, Jan. 2017.
6 Micro software interactive, micro Software, Testing standards for embedded software, pp. 132-139, June 2011.
7 Texas Instrument INC, SYS/BIOS (TI-RTOS Kernel) User's Guide, May. 2017.
8 Wind River Systems INC, vxworks kernel programmers guide 6.2, Oct. 2005.
9 Parkinson, Paul and Larry Kinnan. "Safety-critical software development for integrated modular avionics." Embedded System Engineering, vol. 11, no. 7, pp. 40-41, 2003
10 Qian, Hua-ming, and Chun Zheng. "A embedded software testing process model." International Conference on Computational Intelligence and Software Engineering(CiSE) 2009 IEEE, pp. 1-5, Dec. 2009.
11 Johnson, Leslie A., "DO-178B, Software considerations in airborne systems and equipment certification." Crosstalk, Oct. 1998.
12 Kowkutla, Venkateswar, and Srivaths Ravi. "Security Standards for Embedded Devices and Systems." Fundamentals of IP and SoC Security. Springer, Cham, pp.295-311, Jan. 2017.
13 Tsai, Wei-Tek, et al. "Rapid embedded system testing using verification patterns," IEEE software 22.4, pp. 68-75, July 2005.   DOI
14 Wotzak, William J., and Kenneth P. Fecteau. "Advanced integrated avionics testing system." U.S. Patent No. 5,638,383, June 1997.
15 Abdelaziz, Adil A., Yaseen El-Tahir, and Raheeg Osman. "Adaptive Software Development for developing safety critical software." 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), pp. 41-46, Sept. 2015.
16 Cui, Ang, Michael Costello, and Salvatore J. Stolfo. "When Firmware Modifications Attack: A Case Study of Embedded Exploitation." NDSS. pp. 1-13, Feb. 2013.
17 SJeppu, Yogananda V., Kundapur Karunakar, and P. S. Subramanyam. "Testing safety critical Ada code using non real time testing." International Conference on Reliable Software Technologies. Springer, Berlin, Heidelberg, pp. 382-393, June 2003.
18 Singh, Raghu. "International Standard ISO/IEC 12207 software life cycle processes." Software Process Improvement and Practice 2.1, pp.35-50, Mar. 1996.   DOI
19 Director.Operational Test and Evaluation, "Mission Planning Systems (MPS) / Joint Mission Planning System - Air Force (JMPS-AF)", FY 2017 Annual Report, pp.267-268, Mar. 2017.
20 Foster, John, and Kevin Cunningham, "A GPS-based pitot-static calibration method using global output error optimization." 48th AIAA Aerospace Sciences Meeting Including the New Horizons Forum and Aerospace Exposition, p. 1350, Jan. 2010.