HomeTechnologyAviation Aerospace and DefenceSecuring Aerospace & Defense Software: The Critical Role of SBOMs

Securing Aerospace & Defense Software: The Critical Role of SBOMs

Satellites, spacecraft, and defense systems rely on increasingly complex software ecosystems that integrate open-source, third-party, and legacy components. Recent cybersecurity events have highlighted how vital it is to track, secure, and manage these software supply chains.

The Risk of Vulnerable Third-Party Components

At Black Hat 2025, some very serious vulnerabilities were discovered in some of the most commonly used platforms for satellite control: Yamcs, OpenC3 Cosmos, and NASA’s cFS Aquila. Such flaws-range from remote code execution, denial of service, weak encryption to manipulation of satellite operations-force criminals into changing orbital paths or stealing cryptographic keys, usually without even detection.

Even seeming-to-be-secure encryption libraries such as CryptoLib-which NASA uses-were found to harbor multiple critical vulnerabilities. Exploiting these, attackers could crash the onboard software, reset its security state, or compromise encrypted communications. These findings reinforce that third-party components remain among the easiest risks to exploit in aerospace and defense software.

SBOMs: Ensuring Transparency Across the Software Stack

Software Bill of Materials lists all components within a system involved. In practice, it finds vulnerabilities, manages risk, considers compliance, and goes into incident response. The SBOM can be only as good as its accuracy, completeness, or governance structure.

In other words, to improve security posture, an organization must hold centralized processes for the validation, enrichment, and continuous surveillance of SBOMs, so that both upstream ones (those from development) and downstream ones (those from deployed systems) are held accountable, validated, and acted upon.

Closing the Gaps

Modern SBOM platforms, such as Keysight’s solutions, enhance binary similarity checks and code emulation to detect components when source information is partial or missing. This allows SBOMs to be reliably created for firmware and software or for container images so that no single component-in whatever form it exists-goes untracked.

Hence, giving full visibility, rigorous validation, and operational governance serve systems in aerospace and defense better in recognizing vulnerabilities, quick incident response, and establishing trust across software supply chains. This closes critical gaps while trying to keep mission-critical systems safe from the ever-evolving cyber threats.

(This article has been adapted and modified from content on Keysight Technologies.)

ELE Times Research Desk
ELE Times Research Deskhttps://www.eletimes.ai
ELE Times provides extensive global coverage of Electronics, Technology and the Market. In addition to providing in-depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build experience, drive traffic, communicate your contributions to the right audience, generate leads and market your products favourably.

Related News

Must Read

STMicroelectronics Launches Next-Generation Ultralow-Power Image Sensors

STMicroelectronics, a global semiconductor leader serving customers across the...

Microchip Technology Launches Single-Pair Ethernet PHYs with Integrated Time and Security Functions

Microchip’s LAN878x and LAN888x PHY families enable secure, scalable...

Nuvoton Launches NuML Studio: Tool to Build and Deploy AI on Microcontrollers

Nuvoton Technology, a leading global semiconductor provider, has announced...

Rohde & Schwarz Presents its Advance Solutions for Power Electronics Testing at PCIM Expo 2026

Rohde & Schwarz presents its latest test and measurement solutions for...

Next-Gen Upgrade to the Halo Series, NoiseFit Halo 3 brings Presence-Led Design and AI to the Wrist

Noise, India’s leading connected lifestyle brand, announces the launch...

Keysight Expands PCIe 7.0 Test Portfolio with New Receiver Stress Calibration

Keysight Technologies today announces a new PCIe 7.0 Receiver...

VETH100A1DD1 ESD Protection Diode Passes IEEE 10BASE-T1S Compliance Tests

The Vishay Semiconductor VETH100A1DD1 ESD has successfully passed IEEE...