Attack Injection into Avionic Systems through Application Code Mutation

被引:2
作者
Damien, Alienor [1 ,2 ]
Feyt, Nathalie [1 ]
Nicomette, Vincent [2 ]
Alata, Eric [2 ]
Kaaniche, Mohamed [2 ]
机构
[1] Thales AVS, Toulouse, France
[2] Univ Toulouse, LAAS CNRS, CNRS, INSA, Toulouse, France
来源
2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) | 2019年
关键词
D O I
10.1109/dasc43569.2019.9081616
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Given the continuous increase of malicious threats targeting embedded systems, the potential malicious modification of an aircraft application, by exploiting an unknown software or hardware vulnerability of the execution platform, must be seriously considered for future systems. Indeed, an insider attack breaking the organization's security measures to insert a malicious function on board could have significant consequences. Various solutions can be investigated to provide enhanced protection against such threats, including intrusion detection techniques. To design an Intrusion Detection System (IDS), and more specifically to evaluate its performance, abnormal data are required. However, to our knowledge, there is no publicly available attack data for aircraft applications. This paper proposes an approach and a tool aiming at automatically performing application code mutations that mimic the behavior of malevolent pieces of code introduced inside an application. The approach relies on three code modification strategies, designed to cover both generic and specific mutations. The tool takes into account the specific characteristics of avionic applications (dedicated hardware, real-time execution, threat model). This paper describes the architecture and implementation details of the tool, as well as some experiments, in which it is used in order to calibrate a Host-based Intrusion Detection System (HIDS) that we are currently implementing. For that purpose, specific code changes are introduced, targeting application integrity and availability as well as safety.
引用
收藏
页数:8
相关论文
共 10 条
[1]   On the Emulation of Vulnerabilities through Software Fault Injection [J].
Cerveira, Frederico ;
Barbosa, Raul ;
Mercier, Marta ;
Madeira, Henrique .
2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, :73-78
[2]  
Damien A., 2018, AER SYST TECHN C AST
[3]   Potential Attacks on Onboard Aerospace Systems [J].
Dessiatnikoff, Anthony ;
Deswarte, Yves ;
Alata, Eric ;
Nicomette, Vincent .
IEEE SECURITY & PRIVACY, 2012, 10 (04) :71-74
[4]   Emulation of software faults: A field data study and a practical approach [J].
Duraes, Joao A. ;
Madeira, Henrique S. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (11) :849-867
[5]  
El Kalam A. A., 2007, P 2007 ACM WORKSH QU
[6]   Vulnerability & Attack Injection for Web Applications [J].
Fonseca, Jose ;
Vieiraz, Marco ;
Madeira, Henrique .
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, :93-+
[7]   Assessing Dependability with Software Fault Injection: A Survey [J].
Natella, Roberto ;
Cotroneo, Domenico ;
Madeira, Henrique S. .
ACM COMPUTING SURVEYS, 2015, 48 (03)
[8]  
Prisaznuk P. J., 2008, 2008 IEEE AIAA 27 DI
[9]  
The MITRE Corporation, 2018, MITR ATT CK
[10]  
Vasilomanolakis E, 2016, IEEE IFIP NETW OPER, P1209, DOI 10.1109/NOMS.2016.7502989