• Skip to primary navigation
  • Skip to main content
  • LinkedIn
  • Videos
  • Research
    • Facilities
    • Vehicles
    • Sponsors
  • Publications
    • Books
    • Journal Papers
    • Conference Papers
  • People
    • Faculty
    • Staff
    • Graduate Students
    • Undergraduate Students
    • Alumni
    • Where VSCL Alumni Work
    • Friends and Colleagues
  • Prospective Students
  • About Us
  • Contact Us
  • Where VSCL Alumni Work

Texas A&M University College of Engineering

Cybersecurity

Jares and Valasek Publish “Control Acquisition Attack of Aerospace Systems via False Data Injection,” in Journal of Aerospace Information Systems

Posted on July 17, 2023 by Cassie-Kay McQuinn

Ph.D. student Garrett Jares and Dr. John Valasek of VSCL published the paper “Control Acquisition Attack of Aerospace Systems via False Data Injection,” in Journal of Aerospace Information Systems.

The cyber threat to aerospace systems has been growing rapidly in recent years with several real-world and experimental cyberattacks observed. This growing threat has prompted investigation of cyber-attack and defense strategies for manned and unmanned air systems, spacecraft, and other aerospace systems. The work in this paper seeks to further understand these attacks by introducing and developing a novel cyberattack for autonomous aerospace systems. The problem faced by the attacker is posed and discussed analytically using false data injection of state measurements to exploit the vehicle’s onboard controller to take control of the system. It is shown that the attacker can utilize traditional control techniques to exert control over the system and eliminate the control of the victim by intercepting and modifying the vehicle’s measurement data. The attacker is able to accomplish this objective without any prior knowledge of the system’s plant, controller, or reference signal. The attack is demonstrated on the elevator-to-pitch-attitude-angle dynamics of a Cessna T-37 aircraft model. It is shown to be successful in eliminating the victim’s control influence over the system and driving the system to its own target state.

This publication is part of VSCL’s ongoing work in the area of cybersecurity. The article can be viewed at https://arc.aiaa.org/doi/full/10.2514/1.I011199.

Filed Under: Cybersecurity, Publications

© 2016–2025 Log in

Texas A&M Engineering Experiment Station Logo
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment