Refine Your Search

Topic

Search Results

Collection

Cybersecurity for Cyber-Physical Vehicle Systems, 2018

2018-04-03
This paper focuses on cybersecurity for cyber-physical vehicle systems. Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. ...Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. ...Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. Application areas include: security-critical automotive systems, as well as other security-critical ground vehicle and aviation systems.
Collection

Cybersecurity for Cyber-Physical Vehicle Systems, 2017

2017-03-28
This paper focuses on cybersecurity for cyber-physical vehicle systems. Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. ...Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. ...Topics include: design, development and implementation of security-critical cyber-physical vehicle systems, cybersecurity design, development, and implementation strategies, analysis methodologies, process and life-cycle management, comparisons of system safety and cybersecurity, etc. Application areas include: security-critical automotive systems, as well as other security-critical ground vehicle and aviation systems.
Training / Education

DO -326A and ED-202A An Introduction to the New and Mandatory Aviation Cyber-Security Essentials

2020-03-12
The international standards D-326A (U.S.) and ED-202A (Europe) titled "Airworthiness Security Process Specification" are the cornerstones of the "DO-326/ED-202 Set" and they are the only Acceptable Means of Compliance (AMC) by FAA & EASA for aviation cyber-security airworthiness certification, as of 2019. The "DO-326/ED-202 Set" also includes companion documents DO-356A/ED-203A: "Airworthiness Security Methods and Considerations" & DO-355/ED-204: "Information Security Guidance for Continuing Airworthiness" (U.S. & Europe) and ED-201: "Aeronautical Information System Security (AISS) Framework Guidance" & ED-205: "Process Standard for Security Certification / Declaration of Air Traffic Management / Air Navigation Services (ATM/ANS) Ground Systems“ (Europe only).
Technical Paper

Information Security Risk Management of Vehicles

2018-04-03
2018-01-0015
The results of this work is allowed to identify a number of cybersecurity threats of the automated security-critical automotive systems, which reduces the efficiency of operation, road safety and system safety. ...According to the evaluating criterion of board electronics, the presence of poorly-protected communication channels, the 75% of the researched modern vehicles do not meet the minimum requirements of cybersecurity due to the danger of external blocking of vital systems. The revealed vulnerabilities of the security-critical automotive systems lead to the necessity of developing methods for mechanical and electronic protection of the modern vehicle. ...The law of normal distribution of the mid-points of the expert evaluation of the cyber-security of a modern vehicle has been determined. Based on the system approach, ranking of the main cybersecurity treats is performed.
Book

Supply Chain Vulnerabilities Impacting Commercial Aviation

2019-09-04
Written by Kirsten Koepsel, a lawyer and engineer whose work has focused on aviation cybersecurity, Supply Chain Vulnerabilities Impacting Commercial Aviation addresses the big question facing aircraft manufacturers today: keep the work in house or outsource it? ...Supply Chain Vulnerabilities Impacting Commercial Aviation discusses the differences in requirements depending on the buyer of the aircraft (governmental or not), ranging from delivery delays to risks linked to cybersecurity and the Internet of Things (IoT), including possible problems with faulty sensors and counterfeit parts.
Magazine

Aerospace & Defense Technology: October 2015

2015-10-01
Countering cybersecurity threats against unmanned vehicle systems Cranfield University researchers have developed a monitoring system whose purpose is to monitor mission profile implementation at both high level mission execution and at lower level software code operation to tackle specific threats of malicious code and possible spurious commands received over a vehicle's data links.
Technical Paper

Secure Deterministic L2/L3 Ethernet Networking for Integrated Architectures

2017-09-19
2017-01-2103
Cybersecurity attacks exploit vulnerabilities related to the increased complexity and connectivity of critical infrastructure systems. ...Network security is a core component of the overall cyber-security and defense-in-depth capability for distributed architectures. Protection mechanism for information, interface and system integrity, communication availability, and data confidentiality are required for design of safe and secure integrated embedded infrastructure.
Technical Paper

Lessons Learned in Inter-Organization Virtual Integration

2018-10-30
2018-01-1944
The SAE AS2C Standard AS5506C Architecture Analysis and Description Language (AADL) is a modeling language for predictive analysis of real-time software reliant, safety and cybersecurity critical systems that provides both the precision of formal modeling and the tool-agnostic freedom of a text-based representation. ...AADL supports multiple domains of architectural analysis such as timing, latency, resources, safety, scheduling, and cybersecurity. Adventium Labs conducted an exercise to determine the applicability of software engineering practices (e.g., continuous integration (CI), application programming interface (API) sharing, test driven development (TDD)) to the AADL-based Architecture Centric Virtual Integration Process (ACVIP).
Book

The Aerospace Supply Chain and Cyber Security - Challenges Ahead

2018-07-20
The Aerospace Supply Chain and Cyber Security - Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technology and its attractiveness to cyber attacks is affecting it, and the way supply chains have become a vital part of the industry's cyber-security strategy. More than ever before, commercial aviation relies on information and communications technology.

2020-01-23
SAE EDGE Research Reports provide examinations significant topics facing mobility industry today including Connected Automated Vehicle Technologies Electrification Advanced Manufacturing
Article

2019-06-11
SAE International’s two-day course, DO-326A and ED-202A: An Introduction to the New and Mandatory Aviation Cyber-Security Essentials, introduces attendees to industry best practices for real-world aviation cybersecurity risk assessment, development, assurance. ...SAE International’s two-day course, DO-326A and ED-202A: An Introduction to the New and Mandatory Aviation Cyber-Security Essentials, introduces attendees to industry best practices for real-world aviation cybersecurity risk assessment, development, assurance.
Article

2019-07-03
Argus, a global leader in automotive cybersecurity, has upgraded its stand-alone Fleet Protection backend platform and is now providing continuous live monitoring of both automotive and commercial aircraft fleets.
Training / Education

Introduction to Cyber Security for Commercial Aviation

2020-05-06
Despite the advantages of electronic flight bags (EFB), passenger entertainment and email access during flights, and the ability to access aircraft repair manuals electronically, computer interconnectivity throughout aviation has opened the aviation sector to cyber-attacks that could impact flights, data, and safety. This two-day seminar is intended to introduce aviation professionals to the need to implement cyber security throughout commercial aviation including the supply chain.
Article

2018-07-24
Supply chains, now being targeted as a pathway to the vital core of organizations around the world, have become a vital part of the industry’s cybersecurity strategy, says Kirsten Koepsel, author of SAE International’s latest book, The Aerospace Supply Chain and Cyber Security – Challenges Ahead, now available.
Standard

Survey of practices for securing the interface through the Data Link Connector (DLC)

2017-07-05
WIP
J3146
This document has been issued to provide a reference or overview of some current practices which could be utilized for securing the vehicle’s interface with the Data Link Connector (DLC) from cybersecurity risks associated with external test equipment connections (e.g. diagnostics scan tools) or remotely connected applications (e.g. telematics devices).
Standard

GUIDANCE FOR USAGE OF DIGITAL CERTIFICATES

2018-07-11
CURRENT
ARINC842-2
This document sets forth guidance for life-cycle management of public/private (i.e., asymmetric) keys that are used to secure interactions among systems.
Video

Advancing Aircraft Cyber Security - Potential New Architectures and Technologies

2012-03-16
Cyber security in the aviation industry, especially in relation to onboard aircraft systems, presents unique challenges in its implementation and management. The cyber threat model is constantly evolving and will continually present new and different challenges to the aircraft operator in responding to new cyber threats without either invoking a lengthy software update and re-certification process or limiting aircraft-to-ground communications to the threatened system or systems. This presentation discusses a number of system architectural options and developing technologies that could be considered to enhance the aircraft cyber protection and defensive capabilities of onboard systems as well as to minimize the effort associated with certification/re-certification. Some of these limit the aircraft?s vulnerabilities or in cyber terms, its ?threat surface?.
Training / Education

Introduction to the Secure Microkernel, seL4

Security continues to be an ever-growing concern in more and more design spaces. There are daily articles about security breaches and there is a need for much higher security through the entire system stack. Thorough testing of systems can lead to stronger security in systems, but testing can only expose so many vulnerabilities. Formal methods is another solution that ensures specific behaviors will not occur. seL4 is the first formally proven microkernel and it is open-source. This makes it a great solution for systems that need strong security.
X