{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:36:41Z","timestamp":1755999401677,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030168735"},{"type":"electronic","value":"9783030168742"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16874-2_11","type":"book-chapter","created":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T23:04:43Z","timestamp":1553641483000},"page":"153-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the Security of MIL-STD-1553 Communication Bus"],"prefix":"10.1007","author":[{"given":"Orly","family":"Stan","sequence":"first","affiliation":[]},{"given":"Adi","family":"Cohen","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"11_CR1","unstructured":"Chong, J., Pal, P., Atigetchi, M., Rubel, P., Webber, F.: Survivability architecture of a mission critical system: the DPASA example. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), December 2005, pp. 10, 504"},{"key":"11_CR2","unstructured":"Data Device Corporation: MIL-STD-1553 Designer\u2019s Guide (1998)"},{"key":"11_CR3","unstructured":"Gillen, A., Shelton, J.: Introduction of 3910 high speed data bus. In: Military Communications Conference, MILCOM 1992, Conference Record. Communications-Fusing Command, Control and Intelligence, pp. 956\u2013960. IEEE (1992)"},{"key":"11_CR4","unstructured":"Gligor, V.D.: A note on the denial-of-service problem. In: IEEE Symposium on Security and Privacy, pp. 139\u2013149 (1983)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, W., Guo, W., Sang, N.: Periodic real-time message scheduling for confidentiality-aware cyber-physical system in wireless networks. In: 2010 Fifth International Conference on Frontier of Computer Science and Technology, pp. 355\u2013360, August 2010","DOI":"10.1109\/FCST.2010.117"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","volume-title":"Information Hiding","author":"MG Kuhn","year":"1998","unstructured":"Kuhn, M.G., Anderson, R.J.: Soft tempest: hidden data transmission using electromagnetic emanations. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 124\u2013142. Springer, Heidelberg (1998). \n                      https:\/\/doi.org\/10.1007\/3-540-49380-8_10"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/09636412.2013.816122","volume":"22","author":"JR Lindsay","year":"2013","unstructured":"Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365\u2013404 (2013)","journal-title":"Secur. Stud."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1952982.1952995","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"11_CR9","unstructured":"Mayoux, J.-J.: The data bus of the next generation European fighters. In: Proceedings of the IEEE 1993 National Aerospace and Electronics Conference, NAECON 1993, pp. 152\u2013156. IEEE (1993)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"McGraw, R.M., Fowler, M.J., Umphress, D., MacDonald, R.A.: Cyber threat impact assessment and analysis for space vehicle architectures. In: International Society for Optics and Photonics SPIE Defense+ Security, p. 90850K (2014)","DOI":"10.1117\/12.2055242"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Miller, B., Rowe, D.: A survey SCADA of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, RIIT 2012, pp. 51\u201356. ACM (2012)","DOI":"10.1145\/2380790.2380805"},{"key":"11_CR12","unstructured":"Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: Preprints of the 1st Workshop on Secure Control Systems, pp. 1\u20136 (2010)"},{"key":"11_CR13","unstructured":"Murdock, J.K., Koenig, J.R.: Open systems avionics network to replace MIL-STD-1553. In: Proceedings of 19th Digital Avionics Systems Conference, 19th DASC (Cat. No. 00CH37126), vol. 1, pp. 4E5\/1\u20134E5\/6, October 2000"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D.: Towards MIL-STD-1553B covert channel analysis. Technical report, Naval Postgraduate School, Monterey, California (2015)","DOI":"10.21236\/ADA613900"},{"key":"11_CR15","unstructured":"US Department of Defense: Fiber Optics Mechanization of an Aircraft Internal Time Division Command\/Response Multiplex Data Bus, May 1988"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Vai, M., et al.: Systems design of cybersecurity in embedded systems. In: 2016 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20136, September 2016","DOI":"10.1109\/HPEC.2016.7761615"}],"container-title":["Lecture Notes in Computer Science","Security and Safety Interplay of Intelligent Software Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16874-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T09:14:47Z","timestamp":1558343687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16874-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030168735","9783030168742"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16874-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cyber Security for Intelligent Transportation Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csits2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cyber.bgu.ac.il\/esorics_csits2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}