High profile breaches have occurred across numerous information systems. One area where attacks are particularly
problematic is autonomous control systems. This paper considers the aerospace information system, focusing on
elements that interact with autonomous control systems (e.g., onboard UAVs). It discusses the trust placed in the
autonomous systems and supporting systems (e.g., navigational aids) and how this trust can be validated. Approaches to
remotely detect the UAV compromise, without relying on the onboard software (on a potentially compromised system)
as part of the process are discussed. How different levels of autonomy (task-based, goal-based, mission-based) impact
this remote characterization is considered.