{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:35:36Z","timestamp":1773387336853,"version":"3.50.1"},"reference-count":121,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179318","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T13:18:15Z","timestamp":1689945495000},"page":"3193-3208","source":"Crossref","is-referenced-by-count":4,"title":["PCSPOOF: Compromising the Safety of Time-Triggered Ethernet"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Loveless","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Linh Thi","family":"Xuan Phan","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Ronald","family":"Dreslinski","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Baris","family":"Kasikci","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"ARINC 664 P7: Aircraft Data Network Part 7 - Avionics Full-Duplex Switched Ethernet Network","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4271\/as6802"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SpaceWire.2016.7771599"},{"key":"ref4","volume-title":"IEEE 802.1Qbv-2015: IEEE Standard for Local and Metropolitan Area Networks - Bridges and Bridged Networks - Amendment 25: Enhancements for Scheduled Traffic","year":"2016"},{"key":"ref5","volume-title":"Deterministic Ethernet and IEEE TSN for Aerospace","author":"Safiulin","year":"2019"},{"key":"ref6","article-title":"IEEE TSN in Aerospace: Capabilities and Future Outlook","volume-title":"Proc. International Conference on Prospects of Civil Avionics Development","author":"Zischka"},{"key":"ref7","article-title":"On Time-Triggered Ethernet in NASA\u2019s Lunar Gateway","volume-title":"NASA Avionics Architectures Community of Practice","author":"Loveless"},{"key":"ref8","volume-title":"International Deep Space Interoperability Standards - Avionics Standard","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/b17365-18"},{"key":"ref10","article-title":"Progression of an Open Architecture: From Orion to Altair and LSS","volume-title":"Tech. Rep. S65-5000-20-0","author":"Fletcher","year":"2009"},{"key":"ref11","article-title":"Radiation-Tolerant System-On-Chip (SOC) with Deterministic Ethernet Switching for Scalable Modular Launcher Avionics","volume-title":"Proc. ERTS","author":"Fidi"},{"key":"ref12","article-title":"GE Fanuc Intelligent Platforms Announces TTEthernet for Safety-Critical Avionics Applications","year":"2009"},{"key":"ref13","article-title":"TTTech to Provide ARINC 664 p7 Products for Mission System on UK AW101 Merlin Mk4\/4a Helicopters","year":"2015"},{"key":"ref14","article-title":"TTEthernet Avionics Backbone a Technology Breakthrough for S-97 Raider","volume-title":"Aviation Today","author":"Bellamy","year":"2015"},{"key":"ref15","article-title":"The TTEthernet Synchronization Protocols and Their Formal Verification","author":"Steiner","year":"2013","journal-title":"Int. J. Crit. Comput."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2514\/6.2008-5291"},{"key":"ref17","article-title":"PCIe Card from TTTech Enables Deterministic Ethernet Connectivity for Industrial PCs","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/vtcfall.2012.6398932"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2010.5548606"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2514\/6.2015-4526"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170786"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/b17365-50"},{"key":"ref23","article-title":"TTEthernet: Time-Triggered Services for Ethernet Net-works","volume-title":"Proc. DASC","author":"Steiner"},{"key":"ref24","article-title":"Time-Triggered Ethernet Slims Down Critical Data Systems","volume-title":"NASA Spinoff","year":"2018"},{"key":"ref25","article-title":"Properties of Time-Triggered Communication Systems - Fault Containment and Error Containment","volume-title":"Time-Triggered Communication.","author":"Obermaisser","year":"2011"},{"key":"ref26","article-title":"A Combined Dependability and Security Approach for Third Party Software in Space Systems","volume-title":"Proc. EDCC","author":"Escorial"},{"key":"ref27","article-title":"Safe to Fly: Certifying COTS Hardware for Spaceflight","volume-title":"Tech. Rep. JSC-CN-22144","author":"Fichuk","year":"2013"},{"key":"ref28","article-title":"Compositional Assurance Cases and Arguments for Distributed MILS","year":"2015","journal-title":"D-MILS Project Partners, Tech. Rep."},{"key":"ref29","article-title":"Properties of Time-Triggered Communication Systems - Certifiability","volume-title":"Time-Triggered Communication.","author":"Obermaisser","year":"2011"},{"key":"ref30","article-title":"From Schenley Place to Outer Space: Pitt Team Developing Computers for Space Station","author":"Cichowicz","year":"2017"},{"key":"ref31","article-title":"Risk Classification for NASA Payloads","volume-title":"National Aeronautics and Space Administration, Tech. Rep. NPR 8705.4","year":"2004"},{"key":"ref32","article-title":"RFC 826: An Ethernet Address Resolution Protocol","year":"1982"},{"key":"ref33","article-title":"Packets in Packets: Orson Welles\u2019 In-Band Signaling Attacks for Modern Radios","volume-title":"Proc. WOOT","author":"Goodspeed"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1998.689491"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/5.259424"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-2111"},{"key":"ref37","article-title":"On TTEthernet for Integrated Fault-Tolerant Spacecraft Networks [Slides]","volume-title":"Proc. AIAA SPACE","author":"Loveless"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128447"},{"key":"ref39","article-title":"Time-Triggered Ethernet - Protocol Services, Communication Services, Media Access Control","volume-title":"Time-Triggered Communication.","author":"Steiner","year":"2011"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2013.6712579"},{"key":"ref41","article-title":"Time-Triggered Ethernet - Protocol Services, Startup and Restart, Clique Detection","volume-title":"Time-Triggered Communication.","author":"Steiner","year":"2011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00036"},{"key":"ref43","article-title":"System and Method for a Cross Channel Data Link","volume-title":"US Patent","author":"Bonk","year":"2010"},{"key":"ref44","article-title":"TTTech Company Overview","volume-title":"TTTech Comput-ertechnik AG","author":"Plankensteiner","year":"2011"},{"key":"ref45","article-title":"Recommendations on Use of Commercial-Off-The-Shelf (COTS) Electrical, Electronic, and Electromechanical (EEE) Parts for NASA Missions","volume-title":"Tech. Rep. NESC-RP- 19-01490","author":"Hodson","year":"2020"},{"key":"ref46","article-title":"Ensuring Successful Implementation of Commercial Items in Air Force Systems","volume-title":"Tech. Rep. SAB-TR-99-03","year":"2000"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00052"},{"key":"ref48","article-title":"Designing and Implementing Malicious Hardware","volume-title":"Proc. LEET","author":"King"},{"key":"ref49","article-title":"The Role of ESA TEC-QTE in the ISS Safety Process","volume-title":"Proc. IAASS","author":"Orlandi"},{"key":"ref50","article-title":"Mission Assurance Guidelines for A-D Mission Risk Classes","volume-title":"Tech. Rep. TOR-2011(8591)-21","author":"Johnson-Roth","year":"2011"},{"key":"ref51","article-title":"CSP Hybrid Space Computing for STP-H5\/ISEM on ISS","volume-title":"Proc. Conference on Small Satellites","author":"Wilson"},{"key":"ref52","article-title":"New Semi-Rugged Laptop for Manufacturing and Automotive Professionals","year":"2021"},{"key":"ref53","article-title":"TTE Controller","volume-title":"EtherSpace Consortium","author":"Deutschinger","year":"2021"},{"key":"ref54","volume-title":"IEEE 802.3-2018: IEEE Standard for Ethernet","year":"2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/DASC52595.2021.9594416"},{"key":"ref56","article-title":"TTE Verify","volume-title":"TTTech Computertechnik AG","year":"2022"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16612-9_25"},{"key":"ref58","article-title":"iSAFT Test Tool for Deterministic On-board Ethernet Networks","volume-title":"Proc. ESA Workshop on ADCSS"},{"key":"ref59","article-title":"TT6802-1-SW: The TTE Switch Controller Space","volume-title":"TTTech Comput-ertechnik AG","year":"2022"},{"key":"ref60","article-title":"TTE Switch Module A664 Pro","volume-title":"TTTech Computertechnik AG","year":"2022"},{"key":"ref61","article-title":"TTE-Plan User Manual","volume-title":"Tech. Rep. D-TTE-G-01-014","year":"2020"},{"key":"ref62","article-title":"TTE Switch Space 3U cPCI","volume-title":"TTTech Computertechnik AG","year":"2022"},{"key":"ref63","article-title":"EtherOops: Bypassing Firewalls and NATs by Exploiting Packet-in-Packet Attacks in Ethernet","author":"Seri","year":"2020","journal-title":"Armis, Tech. Rep."},{"key":"ref64","article-title":"Fully Arbitrary 802.3 Packet Injection - Maximizing the Ethernet Attack Surface","volume-title":"Proc. Black Hat","author":"Barisani"},{"key":"ref65","article-title":"XCORE-200","volume-title":"XMOS","year":"2022"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59767-6_31"},{"key":"ref67","article-title":"Communications and Connectivity - Ethernet Indepth, Wiring Types","volume-title":"Automation of Water Resource Recovery Facilities: WEF Manual of Practice No. 21","author":"Rutemiller","year":"2013"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/b978-075067616-8\/50009-1"},{"key":"ref69","article-title":"TTE Switch A664 Lab v2.0","volume-title":"TTTech Computertechnik AG","year":"2022"},{"key":"ref70","article-title":"Designing Ethernet Cable Ports to Withstand Lightning Surges","volume-title":"In Compliance Magazine","author":"Randolph","year":"2016"},{"key":"ref71","article-title":"Comidox 15KV Boost High Voltage Generator","year":"2022"},{"key":"ref72","article-title":"vacuum spark gap","year":"2022"},{"key":"ref73","article-title":"TTE Switch OBC HiRel","volume-title":"TTTech Computertechnik AG","year":"2022"},{"key":"ref74","article-title":"Time Triggered Ethernet for Space Gateway","volume-title":"EE News Europe","author":"Flaherty","year":"2021"},{"key":"ref75","article-title":"Data Network Evaluation Criteria Report","volume-title":"Tech. Rep. DOT\/FAA\/AR-09\/27","year":"2009"},{"key":"ref76","article-title":"Notional 1FT Voting Architecture with Time-Triggered Ethernet","volume-title":"AES A&S Tag-Up Meeting","author":"Loveless"},{"key":"ref77","article-title":"Overview of TTE Applications and Development at NASA\/JSC","volume-title":"CCSDS SOIS SUBNET Working Group Meeting","author":"Loveless"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.5772\/9505"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ZINC.2017.7968662"},{"key":"ref80","article-title":"Distributed Real-time Architecture for Mixed Criticality Systems (DREAMS)","volume-title":"Tech. Rep. Fault Injection Framework D5.2.3","author":"Abuteir","year":"2016"},{"key":"ref81","article-title":"TTEthernet: Theory, Concepts, and Applications","volume-title":"Proc. ETR","author":"Chaudron"},{"key":"ref82","article-title":"COTS for Space","volume-title":"Proc. RADECS","author":"Plettner"},{"key":"ref83","volume-title":"Core Flight System Scheduler (SCH) Application Design Review","year":"2019"},{"key":"ref84","article-title":"NASA\/GSFC\u2019s Flight Software Core Flight System","volume-title":"Proc. Flight Software Workshop","author":"McComas"},{"key":"ref85","article-title":"Final Report: Design of an Integrated Airframe\/Propulsion Control System Architecture","volume-title":"NASA Contractor Report 182007","author":"Cohen","year":"1992"},{"key":"ref86","article-title":"A Survey of Provably Correct Fault-Tolerant Clock Synchronization Techniques","volume-title":"Tech. Rep. NASA-TM-100553","author":"Butler","year":"1988"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-012-0182-7"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref89","article-title":"The X-38 Spacecraft Fault-Tolerant Avionics System","volume-title":"Proc. MAPLD","author":"Kouba"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.1992.282179"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1201\/b17365-51"},{"key":"ref92","volume-title":"Asteroid Redirect Robotic Mission","year":"2022"},{"key":"ref93","volume-title":"Trick 13 Simulation Environment","year":"2022"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2003.1184271"},{"key":"ref95","article-title":"TP302 Ethernet Surge Protector PoE+ Gigabit RJ45 Lightning Suppressor","volume-title":"Tupavco","year":"2022"},{"key":"ref96","article-title":"TTEthernet in Orion","volume-title":"Industrial Communication Technology Handbook.","author":"Steiner","year":"2014"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854370"},{"key":"ref98","article-title":"SEPHY: Space Ethernet Physical Layer Transceiver","volume-title":"European Union\u2019s Horizon 2020 Programme"},{"key":"ref99","volume-title":"IEEE 802.1AE-2018: IEEE Standard for Local and Metropolitan Area Networks - Media Access Control (MAC) Security","year":"2018"},{"key":"ref100","article-title":"Aviation Cyber Security Study","volume-title":"Tech. Rep.","author":"Kainrath","year":"2017"},{"key":"ref101","article-title":"Generation of a Testbed for the Validation of the TTEthernet Technology","volume-title":"Proc. ESA TEC-ED\/SW Presentation Days, Airbus Defence and Space"},{"key":"ref102","article-title":"Fault Injection Framework for Assessing Fault Containment of TTEthernet Against Babbling Idiot Failures","volume-title":"Proc. IWQoS","author":"Onwuchekwa"},{"key":"ref103","article-title":"Fault Injection Framework for Time-Triggered Systems","volume-title":"Ph.D. dissertation","author":"Onwuchekwa","year":"2020"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33675-1_33"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766513"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2008.4652026"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256315"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEUROPE48519.2020.9245650"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEUROPE48519.2020.9245851"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00016"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019323"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"ref113","article-title":"REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation","author":"Chen","year":"2018"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9030144"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00017"},{"key":"ref116","article-title":"Improving Security for Time-Triggered Real-Time Systems against Timing Inference Based Attacks by Schedule Obfuscation","volume-title":"Proc. ECRTS","author":"Kr\u00fcger"},{"key":"ref117","article-title":"Vulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered} Systems","volume-title":"Proc. ECRTS","author":"Kr\u00fcger"},{"key":"ref118","volume-title":"USBKill","year":"2022"},{"key":"ref119","volume-title":"Etherkiller - Coming Soon to a NIC Near You","year":"2022"},{"key":"ref120","volume-title":"A Weapon for the Mass Destruction of Computer Infrastructures","author":"Fragkos","year":"2015"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.2514\/6.2018-5248.c1"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179318.pdf?arnumber=10179318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T04:27:48Z","timestamp":1769488068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":121,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179318","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}