Symbolic verification for the identification of critical failure-chain scenarios in flight control systems
dc.contributor.author | Scherb, Christopher | |
dc.contributor.author | Trapp, Alexander | |
dc.contributor.author | Hutter, Ruben | |
dc.contributor.author | Bachmann, Nico | |
dc.contributor.author | Heitz, Luc | |
dc.date.accessioned | 2025-10-17T14:40:42Z | |
dc.date.issued | 2025 | |
dc.description.abstract | Flight control systems now integrate more digital electronics and networked subsystems than ever before, creating unprecedented opportunities for cascading failures triggered by cyber attacks. Traditional safety analysis methods fail to capture the complex interdependencies that enable attackers to orchestrate multi-component failures, particularly in safety-critical domains such as aviation. This paper presents two complementary tools for analyzing security vulnerabilities in flight control systems and other cyber-physical systems: TraceGuard, which performs taint-guided symbolic execution for efficient vulnerability discovery in individual components, and MCS Analyser, which models inter-component communication to identify system-level failure chains. TraceGuard extends the angr symbolic execution framework with intelligent path prioritization based on taint tracking, focusing computational resources on security-relevant execution paths. MCS Analyser employs a three-phase approach to discover communication patterns, analyze message flows, and construct comprehensive system models. Our evaluation demonstrates significant improvements over existing approaches. TraceGuard achieved up to 5× improvement in vulnerability discovery (finding 5 vulnerabilities versus 1 in complex test cases) while exploring only 36.8% to 75% of basic blocks. The taint-guided prioritization successfully maintains 100% vulnerability detection while dramatically reducing computational overhead. MCS Analyser analyzed a 12-component UAV simulation, discovering 42 unique message flows and identifying 15 tainted propagation paths that could enable cascading failures. The integration of these tools enables identification of edge-case attack scenarios requiring precise coordination of multiple component states—situations with negligible natural probability but achievable through deliberate attacks. Expert validation from aerospace industry confirms the practical value of automated communication path discovery and edge-case identification. The framework provides engineers with concrete evidence for security design decisions, supporting rigorous security-by-design practices in cyber-physical systems development. | |
dc.event | 74. Deutscher Luft-und Raumfahrtkongress 2025 | |
dc.event.end | 2025-09-25 | |
dc.event.start | 2025-09-23 | |
dc.identifier.uri | https://irf.fhnw.ch/handle/11654/53225 | |
dc.language.iso | en | |
dc.publisher | Deutsche Gesellschaft für Luft-und Raumfahrt | |
dc.relation.ispartof | Deutscher Luft- und Raumfahrtkongress Publications | |
dc.spatial | Bonn | |
dc.subject.ddc | 004 - Computer Wissenschaften, Internet | |
dc.subject.ddc | 620 - Ingenieurwissenschaften und Maschinenbau | |
dc.title | Symbolic verification for the identification of critical failure-chain scenarios in flight control systems | |
dc.type | 04B - Beitrag Konferenzschrift | |
dspace.entity.type | Publication | |
fhnw.InventedHere | Yes | |
fhnw.ReviewType | Anonymous ex ante peer review of an abstract | |
fhnw.affiliation.hochschule | Hochschule für Informatik FHNW | de_CH |
fhnw.affiliation.institut | Institut für Mobile und Verteilte Systeme | de_CH |
fhnw.openAccessCategory | Closed | |
fhnw.publicationState | Published | |
relation.isAuthorOfPublication | 0a902382-d63d-4b27-89aa-10313a428808 | |
relation.isAuthorOfPublication | 131f65ff-8c72-4f2f-9b2c-731a6db69a37 | |
relation.isAuthorOfPublication | 94d54696-7b4c-4666-a57b-5e1896c89fff | |
relation.isAuthorOfPublication | 3d578036-7d93-412c-ab10-65662dd0d5d2 | |
relation.isAuthorOfPublication | 2f439b50-2890-452e-b36b-899a9de8da36 | |
relation.isAuthorOfPublication.latestForDiscovery | 0a902382-d63d-4b27-89aa-10313a428808 |
Dateien
Lizenzbündel
1 - 1 von 1
Lade...
- Name:
- license.txt
- Größe:
- 2.66 KB
- Format:
- Item-specific license agreed upon to submission
- Beschreibung: