TECH

OpenARIA : Enhancing Aviation Safety Through Open-Source Innovation

This repository contains an open-source edition of the Aviation Risk Identification and Assessment (ARIA) software program developed by MITRE on behalf of the Federal Aviation Administration’s (FAA) Safety and Technical Training (AJI) Service Unit.

OpenARIA’s Goal

Our goal is to build a community focused on improving aviation safety & efficiency by extracting value from aircraft location data.

How OpenARIA Can Achieve This Goal

  1. Provide a publicly available solution for detecting aviation risks within aircraft location data.
    • This tangible working solution can be critiqued by the community and improved as necessary.
  2. Provide a publicly available solution for detecting and then aggregating aviation risks for bulk analysis.
    • Someone operating OpenARIA for a day will have one day’s worth of output
    • Someone operating OpenARIA for a year will have a year’s worth of output.
    • We must facilitate capturing and utilizing large amounts of output data.
  3. Provide a publicly available solution for archiving and replaying aircraft location data
    • E.g., when OpenARIA detects an event, we will want to be able to replay the event to understand what happened.
  4. Provide solutions that work with near-real time data streams as well as archival data.

Getting Started

  • To begin detecting aviation events see here
  • To begin archiving and replaying aircraft location data see here
  • To begin detecting and then aggregating aviation data see here

Documentation

Using And Contributing

First of all, Welcome to the community!

Contributing As A User

  • Please submit feedback.
  • Do you have a technical question? If so, please ask. We are here to help. Your question could lead to improvements. User questions lead to improved documentation, understanding defects, and eventually code improvements the reach everyone in the community.
  • Do you have a feature request? If so, please ask. We’ll see what we can do given the development time we have available.

Contributing As A Developer

  • We will use GitHub’s Issue tracking features when the project launches.
  • Anyone interested in making technical contributions is welcomed to communicate with the dev team on GitHub. Feel free to submit issues, fix issues, and submit PRs.
  • We may write a “contributing guidelines” document in the future should the need arise. But for now, our focus will be on making high-quality, high-value improvements to the code (not policy documents).

Near-Term Project RoadMap

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

8 hours ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago