| ID | Name |
|---|---|
| T2053.001 | Receiver flooding |
| T2053.002 | Avionics Bus Flooding |
| T2053.003 | OBC overloading |
| T2053.004 | Drain satellite's power |
| T2053.005 | Waste of propellant |
| T2053.006 | RTOS Scheduler Compromise |
| T2053.007 | Hypervisor Scheduling Compromise |
This technique involves overwhelming the avionics bus by injecting an excessive volume of messages, leading to the saturation or exhaustion of communication resources. An attacker can achieve this by gaining control over an ECU (Electronic Control Unit) or microcontroller with access to the bus (e.g., on the CAN bus). This access may be obtained through exploitation of system vulnerabilities or by physically connecting a compromised device to the bus. By flooding the bus with high-priority messages, the attacker can suppress lower-priority communications, causing delays, denial of service, or complete failure of mission-critical operations.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.