2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) 2019
DOI: 10.1109/dasc43569.2019.9081614
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Database Reference A secure design-for-test infrastructure for lifetime security of SoCs IEEE [14] Safety and security aware framework for the development of feedback control systems IEEE [15] Designing safe and secure autopilots for the urban environment IEEE [16] Cyber-Physical Systems Security-A Survey IEEE [8] Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree IEEE [17] Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations IEEE [18] The Need for a Secure Modular Open Systems Approach (MOSA): Building the Case Using Systems Thinking Methodologies IEEE [9] Attacks on Distributed Sequential Control in Manufacturing Automation IEEE [19] A Multicycle Pipelined GCM-Based AUTOSAR Communication ASIP IEEE [20] Cyber-Attacks in Modular Multilevel Converters IEEE [21] Securing Robots: An Integrated Approach for IEEE [22] Security Challenges and Monitoring for the Robotic Operating System (ROS) Security Threat Analysis and Treatment Strategy for ORAN IEEE [23] Security Risk Assessment and Risk Treatment for Integrated Modular Communication Scopus [24] Big Missions, Small Solutions Advances and Innovation in Architecture and Technology for Small Satellites Scopus [10] Considerations and examples of a modular open systems approach in defense systems Scopus [7] Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping Scopus [25] Security Considerations in Modular Mobile Manipulation Scopus [26] Openness and Security Thinking Characteristics for IoT Ecosystems Scopus [27] Railway Defender Kill Chain to Predict and Detect Cyber-Attacks Scopus [28] Mission Systems Open Architecture Science and Technology (MOAST) program SPIE [29] Joint Communications Architecture for Unmanned Systems (JCAUS) SPIE [30] Designing the next generation of sensor systems using the SOSA standard SPIE [31] A systems approach to achieving the benefits of open and modular systems SPIE [32] Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection SPIE [33] Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine SPIE [34] Secure Internet of Things Architecture (SIoTA) on the battlefield SPIE…”
Section: Titlementioning
confidence: 99%
See 3 more Smart Citations
“…Database Reference A secure design-for-test infrastructure for lifetime security of SoCs IEEE [14] Safety and security aware framework for the development of feedback control systems IEEE [15] Designing safe and secure autopilots for the urban environment IEEE [16] Cyber-Physical Systems Security-A Survey IEEE [8] Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree IEEE [17] Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations IEEE [18] The Need for a Secure Modular Open Systems Approach (MOSA): Building the Case Using Systems Thinking Methodologies IEEE [9] Attacks on Distributed Sequential Control in Manufacturing Automation IEEE [19] A Multicycle Pipelined GCM-Based AUTOSAR Communication ASIP IEEE [20] Cyber-Attacks in Modular Multilevel Converters IEEE [21] Securing Robots: An Integrated Approach for IEEE [22] Security Challenges and Monitoring for the Robotic Operating System (ROS) Security Threat Analysis and Treatment Strategy for ORAN IEEE [23] Security Risk Assessment and Risk Treatment for Integrated Modular Communication Scopus [24] Big Missions, Small Solutions Advances and Innovation in Architecture and Technology for Small Satellites Scopus [10] Considerations and examples of a modular open systems approach in defense systems Scopus [7] Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping Scopus [25] Security Considerations in Modular Mobile Manipulation Scopus [26] Openness and Security Thinking Characteristics for IoT Ecosystems Scopus [27] Railway Defender Kill Chain to Predict and Detect Cyber-Attacks Scopus [28] Mission Systems Open Architecture Science and Technology (MOAST) program SPIE [29] Joint Communications Architecture for Unmanned Systems (JCAUS) SPIE [30] Designing the next generation of sensor systems using the SOSA standard SPIE [31] A systems approach to achieving the benefits of open and modular systems SPIE [32] Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection SPIE [33] Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine SPIE [34] Secure Internet of Things Architecture (SIoTA) on the battlefield SPIE…”
Section: Titlementioning
confidence: 99%
“…Most of these were further categorized as Interception and Content Spoofing. Examples of Interception attacks found in the literature were eavesdropping on private data or credentials [8][19] [35], interception of transmitted information [18], and monitoring sensor data [38]. Examples of Content Spoofing are radar data spoofing [16], spoofing attacks on address resolution protocol in SCADA systems [8], GPS/GNSS navigation data spoofing [18], and speedometer data spoofing [20].…”
Section: B Attack Vectorsmentioning
confidence: 99%
See 2 more Smart Citations