Countering Cybersecurity and Counterfeit Material Threats in Test Systems

被引:0
|
作者
Semancik, Jon [1 ]
Yazma, Ron [1 ]
机构
[1] Marvin Test Solut Inc, Irvine, CA 92614 USA
来源
关键词
Cybersecurity; AD9100D; AS5553; Security Technical Implementation Guide (STIG); LXI; ATE; TPS; ATEasy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic test systems designed to validate the performance of military and aerospace products have always been held to a higher standard; moreover, emerging threats to data security and instrumentation integrity continue to raise this bar. Engineers are faced with growing pressure to not only ensure that the unit under test (UUT) meets all design criteria, but that it remains safe from malicious attacks aimed at gaining access to test parameters or results, controlling of test sequences and functionality, downloading malware, or impacting functionality by way of counterfeit parts installed in instrumentation. This paper will delve into the cybersecurity issue from the perspective of the test development environment, including the use of test executives, and the challenges associated with minimizing impact to data integrity and access to control. An undetected data breach on military / aerospace automated test equipment (ATE) holds significance beyond just the test system, since mission critical electronics associated with avionics, radar, electronic warfare and missile assemblies must also be protected. One topic discussed will be the impact of adopting methods and procedures detailed in the Department of Defense's (DoD) Application Security Technical Implementation Guide, which is based on NIST documents and details how to manage and maintain a secure software-based system such as an ATE system. Another aspect of cybersecurity that is often overlooked in the world of commercial- off-the-shelf (COTS) instrumentation and switching systems is the potential impact on the UUT from substandard counterfeit parts and those embedded with malware. Concerns with counterfeit material can encompass a range of threats including the re-purposing of used parts and new knock-off parts with substandard operating characteristics represented and sold as new hardware. One of the most concerning aspects, parts intentionally infected with malware, can pose a significant risk to personnel and national security. We will discuss various strategies aimed at countering these threats, including the adoption of policies and procedures outlined in AS9100D and AS5553, which can mitigate these risks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Countering Counterfeit Drugs
    Bhunia, Swarup
    Mandal, Soumyajit
    [J]. IEEE SPECTRUM, 2019, 56 (09) : 38 - 43
  • [2] Countering Counterfeit Drugs
    不详
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2012, 307 (02): : 134 - 134
  • [3] Countering Counterfeit Trade
    Loebl, Zbynek
    [J]. COMPUTER SCIENCE REVIEW, 2009, 3 (03) : 195 - 197
  • [4] Cybersecurity Threats in Military Robotic and Autonomous Systems
    Borges, Jose
    Rosado, David Pascoal
    [J]. ROBOT 2023: SIXTH IBERIAN ROBOTICS CONFERENCE, VOL 2, 2024, 978 : 237 - 243
  • [5] Means of Countering Threats in Communication Systems of Broker Companies
    Shamov, Sergii
    Sarbash, Alyona
    Florov, Sergey
    [J]. 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 187 - 192
  • [6] Countering security threats
    Rhodes, Ella
    [J]. PSYCHOLOGIST, 2016, 29 (01) : 14 - 14
  • [7] Countering microbial threats
    Ember, Lois
    [J]. 2003, American Chemical Society (81):
  • [8] COUNTERING TERRORIST THREATS
    MUSACCHIO, JM
    ROZEN, A
    [J]. CIVIL ENGINEERING, 1989, 59 (06): : 62 - 64
  • [9] CYBERSECURITY VULNERABILITIES AND THREATS OF SCADA SYSTEMS IN CRITICAL INFRASTRUCTURES
    Savin, Vlad Daniel
    Serban, Costel
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL MANAGEMENT CONFERENCE: MANAGEMENT STRATEGIES FOR HIGH PERFORMANCE (IMC 2019), 2019, : 234 - 237
  • [10] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
    Almaiah, Mohammed Amin
    Saqr, Leen Mohammad
    Al-Rawwash, Leen Ahmad
    Altellawi, Layan Ahmed
    Al-Ali, Romel
    Almomani, Omar
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3189 - 3220