{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:39:57Z","timestamp":1770917997510,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Faculty of Information Technology of the University of Jyv?skyl?","award":["07.04.2021"],"award-info":[{"award-number":["07.04.2021"]}]},{"name":"Finnish Grid and Cloud Infrastructure","award":["urn:nbn:fi:research-infras-2016072533"],"award-info":[{"award-number":["urn:nbn:fi:research-infras-2016072533"]}]},{"DOI":"10.13039\/501100003125","name":"Suomen Kulttuurirahasto","doi-asserted-by":"publisher","award":["00221059"],"award-info":[{"award-number":["00221059"]}],"id":[{"id":"10.13039\/501100003125","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3198947","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T19:51:16Z","timestamp":1660593076000},"page":"86542-86557","source":"Crossref","is-referenced-by-count":15,"title":["On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication"],"prefix":"10.1109","volume":"10","author":[{"given":"Artturi","family":"Juvonen","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2704-9715","authenticated-orcid":false,"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7631-620X","authenticated-orcid":false,"given":"Hannu","family":"Turtiainen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4168-9102","authenticated-orcid":false,"given":"Timo","family":"Hamalainen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv&#x00E4;skyl&#x00E4;, Jyv&#x00E4;skyl&#x00E4;, Finland"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Apache Log4J Security Vulnerabilities","year":"2021"},{"key":"ref2","volume-title":"Binare\u2019s Firmware Insights || Critical Vulnerability in Apache Log4J Library || CVE-2021-44228","year":"2022"},{"key":"ref3","volume-title":"Global Air Navigation Plan 2016-2030","year":"2016"},{"key":"ref4","volume-title":"Reception of Automatic Dependent Surveillance Broadcast Via Satellite and Compatibility Studies With Incumbent Systems in the Frequency Band 1087.7\u20131092.3 MHz","year":"2017"},{"key":"ref5","volume-title":"Satellite\u2014Automatic Identification System (SAT-AIS) Overview","year":"2022"},{"key":"ref6","volume-title":"SITA Data Connect","year":"2022"},{"key":"ref7","volume-title":"Topsky\u2013ATC | Thales Group","year":"2022"},{"key":"ref8","volume-title":"Danish Maritime Authority\u2013AIS","author":"Authority","year":"2022"},{"key":"ref9","volume-title":"Data Link Performance Monitoring for the L888 Route [Feasibility Assessment Presentation]","year":"2013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2018.00091"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS.2014.6954620"},{"key":"ref12","volume-title":"HMS Defender: AIS Spoofing is Opening up a New Front in the War on Reality","author":"Bateman","year":"2021"},{"key":"ref13","volume-title":"Preliminary Report Crash involving Malaysia Airlines Boeing 777\u2013200 Flight MH17","year":"2014"},{"key":"ref14","volume-title":"MITRE, CVE-2021-44228","year":"2021"},{"key":"ref15","volume-title":"NIST, NVD\u2014CVE-2021-44228","year":"2021"},{"key":"ref16","volume-title":"MITRE, CVE-2021-45046","year":"2021"},{"key":"ref17","volume-title":"NIST, NVD\u2013CVE-2021-45046","year":"2021"},{"key":"ref18","volume-title":"MITRE, CVE-2021-45105","year":"2021"},{"key":"ref19","volume-title":"NIST, NVD\u2014CVE-2021-45105","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486395"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2767059"},{"key":"ref24","first-page":"1","article-title":"Triton: A software-reconfigurable federated avionics testbed","volume-title":"Proc. 12th USENIX Workshop Cyber Secur. Experimentation Test (CSET)","author":"Crow"},{"key":"ref25","first-page":"1","volume-title":"Ghost in the air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"Costin","year":"2012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3139559"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150840"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164704"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3158943"},{"key":"ref31","volume-title":"Understanding the Impact of Aircraft Information Data: From Next Generation Aircraft on the ACARS Network","year":"2021"},{"key":"ref32","volume-title":"Air\/Ground Character-Oriented Protocol Specification","year":"2016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4324\/9781315566382-4"},{"key":"ref34","first-page":"1371","volume-title":"Technical Characteristics for an Automatic Identification System Using Time-Division Multiple Access in the VHF Maritime Mobile Band","year":"2014"},{"key":"ref35","volume-title":"ACARSGen: Octave\/MATLAB Scripts for ACARS Waveform Generation","author":"Juvonen","year":"2022"},{"key":"ref36","volume-title":"JNDI-Exploit-Kit","author":"pimps","year":"2022"},{"key":"ref37","volume-title":"ACARSDEC: ACARS Decoder (fork by Juvonen, Artturi)","author":"Leconte","year":"2022"},{"key":"ref38","volume-title":"Dump1090-DF24ELM\u2014Fork of Dump1090 Supporting DF24 ELM Messages","author":"Laaksosaari","year":"2022"},{"key":"ref39","volume-title":"Log4Stdin: A Java Application Intentionally Vulnerable to CVE-2021-44228","author":"Juvonen","year":"2022"},{"key":"ref40","volume-title":"Radio Frequency Regulation 4","year":"2021"},{"key":"ref41","volume-title":"Log4shell Waveforms for ACARS, ADS-B, and AIS","author":"Juvonen","year":"2022"},{"key":"ref42","volume-title":"[Log4J2-3230] Apache Log4J Certain Strings Can Cause Infinite Recursion","year":"2021"},{"key":"ref43","article-title":"Dump1090 is a simple Mode S decoder for RTLSDR devices","author":"Sanfilippo","year":"2013"},{"key":"ref44","first-page":"1","volume-title":"Mode-S Specific Services and Data Link Test Bench","year":"1998"},{"key":"ref45","volume-title":"Gary Kessler Associates\u2013AIS Tools","author":"Kessler","year":"2022"},{"key":"ref46","first-page":"1","article-title":"Detecting Malware domains at the upper DNS hierarchy","volume-title":"Proc. 20th USENIX Secur. Symp. (USENIX Secur.)","author":"Antonakakis"},{"key":"ref47","volume-title":"Log4J Java Exploit\u2014WAF and Patches Bypass Tricks","author":"Pulikowski","year":"2022"},{"key":"ref48","volume-title":"Logout4Shell","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2015.7311577"},{"key":"ref50","volume-title":"Flight Radar 24 Live Air Traffic","author":"Flightradar24","year":"2013"},{"key":"ref51","volume-title":"Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j Remote Code Execution (RCE)","author":"Chierici","year":"2021"},{"key":"ref52","volume-title":"Apache Software Flaw Could Result in Major Breaches","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/oxan-es266669"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2000.884940"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2001.964182"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/295\/3\/032026"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/DASC50938.2020.9256659"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2018.8384830"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09857849.pdf?arnumber=9857849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:11:28Z","timestamp":1706789488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9857849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3198947","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}