HomeTechnologyAviation Aerospace and DefenceSecuring Aerospace & Defense Software: The Critical Role of SBOMs

Securing Aerospace & Defense Software: The Critical Role of SBOMs

Satellites, spacecraft, and defense systems rely on increasingly complex software ecosystems that integrate open-source, third-party, and legacy components. Recent cybersecurity events have highlighted how vital it is to track, secure, and manage these software supply chains.

The Risk of Vulnerable Third-Party Components

At Black Hat 2025, some very serious vulnerabilities were discovered in some of the most commonly used platforms for satellite control: Yamcs, OpenC3 Cosmos, and NASA’s cFS Aquila. Such flaws-range from remote code execution, denial of service, weak encryption to manipulation of satellite operations-force criminals into changing orbital paths or stealing cryptographic keys, usually without even detection.

Even seeming-to-be-secure encryption libraries such as CryptoLib-which NASA uses-were found to harbor multiple critical vulnerabilities. Exploiting these, attackers could crash the onboard software, reset its security state, or compromise encrypted communications. These findings reinforce that third-party components remain among the easiest risks to exploit in aerospace and defense software.

SBOMs: Ensuring Transparency Across the Software Stack

Software Bill of Materials lists all components within a system involved. In practice, it finds vulnerabilities, manages risk, considers compliance, and goes into incident response. The SBOM can be only as good as its accuracy, completeness, or governance structure.

In other words, to improve security posture, an organization must hold centralized processes for the validation, enrichment, and continuous surveillance of SBOMs, so that both upstream ones (those from development) and downstream ones (those from deployed systems) are held accountable, validated, and acted upon.

Closing the Gaps

Modern SBOM platforms, such as Keysight’s solutions, enhance binary similarity checks and code emulation to detect components when source information is partial or missing. This allows SBOMs to be reliably created for firmware and software or for container images so that no single component-in whatever form it exists-goes untracked.

Hence, giving full visibility, rigorous validation, and operational governance serve systems in aerospace and defense better in recognizing vulnerabilities, quick incident response, and establishing trust across software supply chains. This closes critical gaps while trying to keep mission-critical systems safe from the ever-evolving cyber threats.

(This article has been adapted and modified from content on Keysight Technologies.)

ELE Times Research Desk
ELE Times Research Deskhttps://www.eletimes.ai
ELE Times provides extensive global coverage of Electronics, Technology and the Market. In addition to providing in-depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build experience, drive traffic, communicate your contributions to the right audience, generate leads and market your products favourably.

Related News

Must Read

Govt Infuses ₹258 Crore Into 128 Startups to Drive DeepTech and IP Creation

In a major move to solidify India's standing as...

Nuvoton Launches Upgraded Driving Smart Device, NuMicro M3331 Series MCU

As the global transition toward industrial automation and smart...

India’s Electronics Powerplay: Why 2026 Will Lead the Way for the Industry

India's electronics and semiconductor sector is currently experiencing a...

Nuvoton and Trustonic Collaborate to Strengthen Security of NuMicro MA35 Series MPU

Leading semiconductor manufacturer, Nuvoton, has partnered with pioneering cybersecurity...

STMicroelectronics and Leopard Imaging use NVIDIA Jetson-ready multi-sensor module for robotics vision 

STMicroelectronics and Leopard Imaging have introduced an all-in-one multimodal...