{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:51:14Z","timestamp":1768416674947,"version":"3.49.0"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"SESAR Joint Undertaking under the European Unions Horizon 2020 research and innovation programme","award":["783287"],"award-info":[{"award-number":["783287"]}]},{"name":"SESAR Joint Undertaking under the European Unions Horizon 2020 research and innovation programme","award":["Engage Knowledge Transfer Network(KTN) project 204"],"award-info":[{"award-number":["Engage Knowledge Transfer Network(KTN) project 204"]}]},{"name":"Faculty of Information Technology University of Jyvaskyla","award":["07.04.2021"],"award-info":[{"award-number":["07.04.2021"]}]},{"name":"Finnish Grid and Cloud Infrastructure FGCI","award":["urn:nbn:fi:research-infras-2016072533"],"award-info":[{"award-number":["urn:nbn:fi:research-infras-2016072533"]}]},{"DOI":"10.13039\/501100003125","name":"Suomen Kulttuurirahasto","doi-asserted-by":"publisher","award":["00211119"],"award-info":[{"award-number":["00211119"]}],"id":[{"id":"10.13039\/501100003125","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3150840","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T20:24:38Z","timestamp":1644524678000},"page":"21554-21562","source":"Crossref","is-referenced-by-count":8,"title":["GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices\u2013A Cybersecurity Pentesting Perspective"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7631-620X","authenticated-orcid":false,"given":"Hannu","family":"Turtiainen","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2704-9715","authenticated-orcid":false,"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"given":"Syed","family":"Khandker","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4168-9102","authenticated-orcid":false,"given":"Timo","family":"Hamalainen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"No Kidding: ADS-B Deadline of Jan. 1, 2020, is Firm","year":"2021"},{"key":"ref2","volume-title":"Easa Seasonal Technical Commission","year":"2018"},{"key":"ref3","article-title":"Federal aviation administration incremental flight testing of automatic dependent surveillance-broadcast (ADS-B) prototype for commercial space transportation applications","volume-title":"Proc. ITEA 32nd Annu. Int. Test Eval. Symp.","author":"Demidovich"},{"key":"ref4","first-page":"1","article-title":"Ghost in the air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","volume-title":"Proc. Black Hat USA","author":"Costin"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3139559"},{"key":"ref6","volume-title":"Practical denial-of-service and combined high-level attacks on real-world ADS-B, ATC, ATM hardware and software","author":"Khandker","year":"2021"},{"key":"ref7","volume-title":"Fuzz Testing of Application Reliability","author":"Miller","year":"2021"},{"key":"ref8","volume-title":"Fuzzing","year":"2021"},{"key":"ref9","volume-title":"Github: Afl","author":"Source","year":"2021"},{"key":"ref10","volume-title":"American Fuzzy Lop","author":"Zalewski","year":"2021"},{"key":"ref11","volume-title":"Apache License, Version 2.0","author":"Foundation","year":"2021"},{"key":"ref12","volume-title":"RTCA DO-267: Minimum Aviation System Performance Standards (MASPS) for Flight Information Services-Broadcast (FIS-B) Data Link","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_16747"},{"key":"ref14","volume-title":"KAP 140 Autopilot System","year":"2021"},{"key":"ref15","volume-title":"G1000 System","year":"2021"},{"key":"ref16","volume-title":"Wireshark Homepage","year":"2021"},{"key":"ref17","volume-title":"Github: Gdl90Dissector","author":"Kyser","year":"2021"},{"key":"ref18","volume-title":"Github: Gdl90","author":"Dey","year":"2021"},{"key":"ref19","volume-title":"Stratus ADS-B Receiver","year":"2021"},{"key":"ref20","volume-title":"SkyRadar ADS-B Receiver","year":"2021"},{"key":"ref21","volume-title":"OpenWrt Project","year":"2021"},{"key":"ref22","volume-title":"AFL User Guide","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.66"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"ref28","article-title":"Faster fuzzing: Reinitialization with deep neural models","volume-title":"arXiv:1711.02807","author":"Nichols","year":"2017"},{"key":"ref29","article-title":"Greybox fuzzing as a contextual bandits problem","volume-title":"arXiv:1806.03806","author":"Patil","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20213701003"},{"key":"ref31","article-title":"Not all bytes are equal: Neural byte sieve for fuzzing","volume-title":"arXiv:1711.04596","author":"Rajpal","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00017"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/612\/3\/032192"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.7763\/IJMO.2018.V8.622"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329828"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"ref38","first-page":"1099","article-title":"FIRM-AFL: High-throughput greybox fuzzing of iot firmware via augmented process emulation","volume-title":"Proc. 28th Secur. Symp.","author":"Zheng"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905744"},{"key":"ref40","volume-title":"Mavlink Developer Guide","year":"2021"},{"key":"ref41","first-page":"1","article-title":"Security analysis of the drone communication protocol: Fuzzing the MAVLink protocol","volume-title":"Proc. ORBIlu","author":"Domin"},{"key":"ref42","volume-title":"Github: MAVLink Fuzz Testing","year":"2019"},{"key":"ref43","volume-title":"The Cybersecurity Status of PX4","year":"2021"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5139\/jksas.2021.49.6.473"},{"key":"ref45","article-title":"Consumer UAV cybersecurity vulnerability assessment using fuzzing tests","volume-title":"arXiv:2008.03621","author":"Rudo","year":"2020"},{"key":"ref46","first-page":"1","article-title":"A large-scale analysis of the security of embedded firmwares","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Costin"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"ref48","first-page":"425","article-title":"RVFuzzer: Finding input validation bugs in robotic vehicles through control-guided testing","volume-title":"Proc. 28th Secur. Symp.","author":"Kim"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6263"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2006.1655886"},{"key":"ref51","article-title":"A security risk analysis of the data communications network proposed in the nextgen air traffic control system","author":"Wood","year":"2009"},{"key":"ref52","first-page":"1","article-title":"Identification of ADS-B system vulnerabilities and threats","author":"Purton","year":"2010","journal-title":"Proc. 33rd Australas. Transp. Res. Forum (ATRF)"},{"key":"ref53","article-title":"The ADS-B protocol and its\u2019 weaknesses: Exploring potential attack vectors","author":"Sj\u00f6din","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660375"},{"key":"ref56","article-title":"Security of ADS-B receivers","author":"Lundberg","year":"2014"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09709804.pdf?arnumber=9709804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:26:13Z","timestamp":1705533973000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9709804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3150840","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}