Symbolic verification for the identification of critical failure-chain scenarios in flight control systems

dc.contributor.authorScherb, Christopher
dc.contributor.authorTrapp, Alexander
dc.contributor.authorHutter, Ruben
dc.contributor.authorBachmann, Nico
dc.contributor.authorHeitz, Luc
dc.date.accessioned2025-10-17T14:40:42Z
dc.date.issued2025
dc.description.abstractFlight control systems now integrate more digital electronics and networked subsystems than ever before, creating unprecedented opportunities for cascading failures triggered by cyber attacks. Traditional safety analysis methods fail to capture the complex interdependencies that enable attackers to orchestrate multi-component failures, particularly in safety-critical domains such as aviation. This paper presents two complementary tools for analyzing security vulnerabilities in flight control systems and other cyber-physical systems: TraceGuard, which performs taint-guided symbolic execution for efficient vulnerability discovery in individual components, and MCS Analyser, which models inter-component communication to identify system-level failure chains. TraceGuard extends the angr symbolic execution framework with intelligent path prioritization based on taint tracking, focusing computational resources on security-relevant execution paths. MCS Analyser employs a three-phase approach to discover communication patterns, analyze message flows, and construct comprehensive system models. Our evaluation demonstrates significant improvements over existing approaches. TraceGuard achieved up to 5× improvement in vulnerability discovery (finding 5 vulnerabilities versus 1 in complex test cases) while exploring only 36.8% to 75% of basic blocks. The taint-guided prioritization successfully maintains 100% vulnerability detection while dramatically reducing computational overhead. MCS Analyser analyzed a 12-component UAV simulation, discovering 42 unique message flows and identifying 15 tainted propagation paths that could enable cascading failures. The integration of these tools enables identification of edge-case attack scenarios requiring precise coordination of multiple component states—situations with negligible natural probability but achievable through deliberate attacks. Expert validation from aerospace industry confirms the practical value of automated communication path discovery and edge-case identification. The framework provides engineers with concrete evidence for security design decisions, supporting rigorous security-by-design practices in cyber-physical systems development.
dc.event74. Deutscher Luft-und Raumfahrtkongress 2025
dc.event.end2025-09-25
dc.event.start2025-09-23
dc.identifier.urihttps://irf.fhnw.ch/handle/11654/53225
dc.language.isoen
dc.publisherDeutsche Gesellschaft für Luft-und Raumfahrt
dc.relation.ispartofDeutscher Luft- und Raumfahrtkongress Publications
dc.spatialBonn
dc.subject.ddc004 - Computer Wissenschaften, Internet
dc.subject.ddc620 - Ingenieurwissenschaften und Maschinenbau
dc.titleSymbolic verification for the identification of critical failure-chain scenarios in flight control systems
dc.type04B - Beitrag Konferenzschrift
dspace.entity.typePublication
fhnw.InventedHereYes
fhnw.ReviewTypeAnonymous ex ante peer review of an abstract
fhnw.affiliation.hochschuleHochschule für Informatik FHNWde_CH
fhnw.affiliation.institutInstitut für Mobile und Verteilte Systemede_CH
fhnw.openAccessCategoryClosed
fhnw.publicationStatePublished
relation.isAuthorOfPublication0a902382-d63d-4b27-89aa-10313a428808
relation.isAuthorOfPublication131f65ff-8c72-4f2f-9b2c-731a6db69a37
relation.isAuthorOfPublication94d54696-7b4c-4666-a57b-5e1896c89fff
relation.isAuthorOfPublication3d578036-7d93-412c-ab10-65662dd0d5d2
relation.isAuthorOfPublication2f439b50-2890-452e-b36b-899a9de8da36
relation.isAuthorOfPublication.latestForDiscovery0a902382-d63d-4b27-89aa-10313a428808
Dateien

Lizenzbündel

Gerade angezeigt 1 - 1 von 1
Lade...
Vorschaubild
Name:
license.txt
Größe:
2.66 KB
Format:
Item-specific license agreed upon to submission
Beschreibung: