FAAs New Flight Control System Has Security Holes: Researcher

  /     /     /  
Publicated : 22/11/2024   Category : security


FAAs New Flight Control System Has Security Holes: Researcher


At the Black Hat conference, a computer scientist demonstrates how fake airplanes can be inserted into FAAs upcoming air traffic control system.



Mission Intelligence: NROs Newest Spy Satellites (click image for larger view and for slideshow)
A key component of the FAAs emerging Next Gen air traffic control system is fundamentally insecure and ripe for manipulation and attack, security researcher Andrei Costin said in a presentation Wednesday at Black Hat 2012 in Las Vegas.
Costin, a computer scientist and graduate student at Eurecom, outlined a series of issues related to the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is being installed as a replacement to the decades-old ground radar system used to guide airplanes through the sky and on the ground at airports.
Among the threats to ADS-B is that the system lacks a capability for message authentication. Any attacker can pretend to be an aircraft by injecting a message into the system, Costin said.
Theres also no mechanism in ADS-B for encrypting messages, so messages related to air traffic--including the ability to identify aircraft, their location, and altitude--can be read by virtually anyone, Costin said. He displayed an air traffic screen capture, taken this year, which ostensibly showed the in-flight location of Air Force One, the Boeing 747 used to transport President Obama.
[ Read about the Department of Defenses plan to let unmanned aircraft share air space with commercial and private planes:
Drones To Fly U.S. Skies, In DOD Plans
. ]
If the aircraft was in fact Air Force One, the easy availability of that information would have national security implications. Its a very high-profile target, said Costin. On the other hand, its possible that the aircraft represented in the screen capture wasnt Air Force One, but another plane identified within ADS-B using Air Force Ones registration code. If the data is false, somebody is spoofing the system, said Costin.
Costin did not provide evidence of any known attacks on ADS-B. Rather, he presented a theoretical scenario in which someone injected the system with data on fake planes, forcing the air traffic control system to adjust to aircraft that werent actually in flight. He characterized such an attack at scale--with one million fake planes, for example—as comparable to a denial-of-service attack on the air traffic control system. Air traffic controllers might be forced to block off air space while they sorted out the mess, he said.
Costin demonstrated how an attack on ADS-B could be mounted using inexpensive software-defined radios. He took airplane data that was publicly available from the system, modified the data, and replayed the data back to a commercial receiver. The possibility of injecting fake airplanes is quite easy, just by taking a real message and crafting it to your needs, he said.
There are also privacy issues, because data on private planes can be culled from ADS-B as well. By matching that data with aircraft registration databases, Costin explained, it would be possible to track non-commercial aircraft from city to city.
In a whitepaper accompanying his presentation, Costin wrote that the types of potential attacks on ADS-B range from passive attacks such as eavesdropping to active attacks, including message jamming and injections of the type he demonstrated.
In addition to the lack of encryption in ADS-B, the whitepaper identifies the following security weaknesses: no use of entity authentication as a way of protecting against message injection, or of message signatures to deter tampering; no challenge-response mechanisms to protect against replay attacks; and lack of ephemeral identifiers for privacy protection.
Questions over the security of the ADS-B system arent new. Aviation experts have warned of vulnerabilities in the past, but the FAA has been reluctant to discuss them. In response to
InformationWeek
, the FAA, in a prepared statement, said it has a thorough process in place to identify possible risks to ADS-B, such as intentional jamming, and that it has taken steps to mitigate risks uncovered as part of an ADS-B security action plan. The agency declined to identify the risks it has identified or addressed, calling them security-sensitive.
The agency conducts ongoing assessments of ADS-B signal vulnerabilities, according to the statement. The FAA said the contract for the ADS-B ground station network requires ongoing independent validation of the accuracy and reliability of ADS-B and aircraft avionics signals. As a backup to ADS-B, the FAA plans to maintain about half of the current network of secondary radars in the unlikely event it is needed.
Security information and event monitoring technology has been available for years, but the information can be hard to mine. In our
SIEM Success
report, we provide a step-by-step guide to make the most of your SIEM system. (Free registration required.)

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
FAAs New Flight Control System Has Security Holes: Researcher