SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Cyber-hijacking Airplanes:
Truth or Fiction?
Dr. Phil of Bloomsburg University
@ppolstra
http://philpolstra.com
Captain Polly of University of <redacted>
@CaptPolly
Why This Talk?
● Lots of bold claims concerning the
feasibility of cyber-hijacking
● Bold claims get lots of press
● Most people don't know enough to
evaluate these claims
● Whether you feel safer or even more
scared should be based on facts
Who is Dr. Phil
● You may know me as a hardware hacker, but I'm also...
– Holder of 12 aviation ratings, all current, including:
● Commercial Pilot
● Flight Instructor
● Aircraft Mechanic
● Inspection Authorization holder
● Avionics Technician
– Have thousands of hours of flight time
– Aircraft builder
– Have worked on the development of avionics found in
modern airliners
– Have access to airliner manuals, current and former
airline pilots
Who is Captain Polly
● Former airline pilot for a major US
carrier
● Thousands of hours in airliners and
small aircraft
● Aviation professor
● Head of college simulator program
● Spouse of a current airline pilot
What you will learn
● How some of the common aircraft systems really
work, including:
– ADS-B
– ADS-A
– ACARS
– Transponders
– Collision avoidance
– GPS
– Autopilots
– Avionics buses and networks
– Attacks being presented by others
Some commonly discussed
attacks
● Hacking into the avionics via the
entertainment network
● Hacking ADS-B
● Hacking engine systems
● Hacking ACARS
Let's get this out of the way to
start
● You cannot override the pilot
● All aircraft feature unhackable
mechanical backup instruments
● You can affect the autopilot operation
– If pilot(s) notice they will disconnect
– Anything you attempt will likely result in
alerts
Attacking avionics networks
● Older aircraft use ARINC 429 networks
– Not connected to anything useful
– Require specialized hardware
● Newer aircraft use a modified version of
Ethernet known as ARINC 664 or AFDX
ARINC 664 and AFDX
● Built on Ethernet, but...
– Can't just start sending packets
– Never wireless
– Some security in place
● Not connected to entertainment system
● Not connected to in-flight wifi
Meet ARINC 664 aka AFDX
● Based on ARINC 629
– First created by Boeing for 777
● Allows the use of common off the shelf
(COTS) components vs ARINC 429
which is proprietary
● Built on Ethernet, but not the same
– Uses redundant channels
– Assigns time slices to avoid collisions
and make it deterministic
ARINC 664 Virtual Links
● Unidirectional logical pipe
● 1 and only 1 sender
● 1 or more receiver
● Timeslicing is used to avoid collisions
– Bandwidth Allocation Gap (BAG)
determines size of timeslice
– Jitter (max latency – min latency)
determined by number of VL and BAG
AFDX Connections
ARINC 664 in real life
Tight Integration with ARINC
664
Entertainment Systems
● Connected to output ports on GPS and
FMS or through a Network Extension
Device (NED)
● Never connected to ARINC
429/629/664
● Remember that the avionics network is
never wireless and not compatible with
your friendly TCP/IP
Boeing 777 Confusion
● Boeing asked for a special condition to
allow the passenger information
network to be connected to other
networks such as the aircraft
information network
● FAA granted this special condition on
11/18/13 provided that a network
extension device (NED) was used and
certain conditions were met
777 Confusion (contd)
FAA specified:
● The applicant must ensure that the design
provides isolation from, or airplane electronic
system security protection against, access by
unauthorized sources internal to the airplane.
The design must prevent inadvertent and
malicious changes to, and all adverse impacts
upon, airplane equipment, systems, networks,
or other assets required for safe flight and
operations.
Meet NED the Network
Extension Device
● Essentially a gateway that goes
between ARINC 429/629/664 and IP
● Like any gateway each path must be
programmed
● FMS does not receive input from NED
– Cannot send bogus commands to FMS
– If NED is compromised may be possible
to impersonate another device
Example NED implementation
● Shameless used from
http://www.teledynecontrols.com/productsolution/ned/blockdiagram.asp
MH370?
● A Boeing 777
● Uses ARINC 629
– Not 664 we've been discussing
– Really not Ethernet
● The 777 is essentially the only plane to
use ARINC 629
– Harder to hack than ARINC 664
Airliner Entertainment System
Connection
Redacted from online slides
Hacking In-flight Wireless
● <video on attacking avionics networks
via in-flight wireless>
Attacking ADS-B/ADS-A
● Can create phantom aircraft
● No security in protocol
● Could create fake weather reports
● Could be jammed
● Not likely to affect TCAS
ADS-B (broadcast)
● Piloted in Alaska
● Intended to improve flying where RADAR
coverage is limited
● Part of a Free Flight system planned for the
future
● Provides traffic and weather where available
● Used by small planes to broadcast position
information
ADS-A (addressable)
● What the airlines use (contrary to what you may have
heard)
● Related to ACARS
● ADS-B == cable-ready TV
● ADA-A == addressable cable box with pay-per-view,
etc
– Allows specific airplanes to send/receive messages
– Allows lower separation outside of RADAR
coverage
– Airliners use neither ADS-B or ADS-A for collision
avoidance
Collision Avoidance
● TIS-B
– Provided by ATC
– Requires a mode S transponder (ADS-B
in)
– Only available in some areas
– Not authoritative
– Does not use ADS-B signals
– ATC does not automatically relay every
ADS-B signal they receive
Collision Avoidance (contd)
● TCAD
– Used in small planes
– Provides information
– Not authoritative
● TCAS
– What the big boys (biz jet and up) use
TCAS
● Uses transponders in the area
● Can actively interrogate other
transponders
● Authoritative
● Pilot can use even if other aircraft not in
sight
Transponders
● Supplement primary RADAR
● Mode S used in ADS-B
● Airliners have at least 2
● Signals are used for collision avoidance
Attacking ADS-B
● <video of ADS-B attack in simulator>
If you could attack ADS-B
● <video of what ADS-B attack would look
like if it really worked>
Attacking engine systems
● Engine monitors are output only
– Information is recorded for maintenance
– Some information may be sent via
ACARS to airline and/or manufacturer
● Some engine control systems are
electronic
– All have purely mechanical backup
– Most only trim mechanical system
electronically
ACARS
● Can be used to send messages to/from
ground
● Messages to/from people or systems
● Used for
– Weather
– Delays
– Updated flight plans
– Maintenance information
Attacking ACARS
● Could create a bogus flight plan update
● Could create bogus weather
● Hypothetically could create fake
messages from plane to ground
● Not a practical way to take over an
airplane
ACARS Attack
● <video showing a bogus flight plan
update via ACARS>
Closing Thoughts
● Nearly every protocol used in aviation is
unsecured
● There is certainly the potential to annoy
ATC and/or small aircraft
● Increasing automation while continuing
with unsecured protocols is problematic
● Airliners are relatively safe (for now)
Questions?
Come see us after or hit us on Twitter at
@ppolstra or @CaptPolly

Weitere Àhnliche Inhalte

Was ist angesagt?

HKG18-116 - RAS Solutions for Arm64 Servers
HKG18-116 - RAS Solutions for Arm64 ServersHKG18-116 - RAS Solutions for Arm64 Servers
HKG18-116 - RAS Solutions for Arm64 Servers
Linaro
 

Was ist angesagt? (18)

Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
 
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SAN19-118
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SAN19-118Reliability, Availability, and Serviceability (RAS) on ARM64 status - SAN19-118
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SAN19-118
 
Introduction to Atmel's 8-bit AVR Microcontrollers
Introduction to Atmel's 8-bit AVR Microcontrollers Introduction to Atmel's 8-bit AVR Microcontrollers
Introduction to Atmel's 8-bit AVR Microcontrollers
 
HKG18-116 - RAS Solutions for Arm64 Servers
HKG18-116 - RAS Solutions for Arm64 ServersHKG18-116 - RAS Solutions for Arm64 Servers
HKG18-116 - RAS Solutions for Arm64 Servers
 
Tutorial on avr atmega8 microcontroller, architecture and its applications
Tutorial on avr atmega8 microcontroller, architecture and its applicationsTutorial on avr atmega8 microcontroller, architecture and its applications
Tutorial on avr atmega8 microcontroller, architecture and its applications
 
Project ACRN GPIO mediator introduction
Project ACRN GPIO mediator introductionProject ACRN GPIO mediator introduction
Project ACRN GPIO mediator introduction
 
Playing with R L C Circuits
Playing with R L C CircuitsPlaying with R L C Circuits
Playing with R L C Circuits
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerOSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
 
XPDDS17: Dedicated Secure Domain as Approach for Certification of Automotive ...
XPDDS17: Dedicated Secure Domain as Approach for Certification of Automotive ...XPDDS17: Dedicated Secure Domain as Approach for Certification of Automotive ...
XPDDS17: Dedicated Secure Domain as Approach for Certification of Automotive ...
 
17 october embedded seminar
17 october embedded seminar17 october embedded seminar
17 october embedded seminar
 
Project ACRN USB mediator introduction
Project ACRN USB mediator introductionProject ACRN USB mediator introduction
Project ACRN USB mediator introduction
 
VoIP Business Telephony Solutions Supporting 30-1500 Users
VoIP Business Telephony Solutions Supporting 30-1500 UsersVoIP Business Telephony Solutions Supporting 30-1500 Users
VoIP Business Telephony Solutions Supporting 30-1500 Users
 
Micro controller
Micro controllerMicro controller
Micro controller
 
Overview of GA-FDM
Overview of GA-FDMOverview of GA-FDM
Overview of GA-FDM
 
The structure is fundamental: IP PBX, telephony cards and tools for high avai...
The structure is fundamental: IP PBX, telephony cards and tools for high avai...The structure is fundamental: IP PBX, telephony cards and tools for high avai...
The structure is fundamental: IP PBX, telephony cards and tools for high avai...
 
embedded system and AVR
embedded system and AVRembedded system and AVR
embedded system and AVR
 

Andere mochten auch

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
 

Andere mochten auch (20)

Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
 
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-frDefcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Defcon 22-richard-klafter-and-eric-swanson-check-your-finger
Defcon 22-richard-klafter-and-eric-swanson-check-your-fingerDefcon 22-richard-klafter-and-eric-swanson-check-your-finger
Defcon 22-richard-klafter-and-eric-swanson-check-your-finger
 
Defcon 22-graham-mc millan-tentler-masscaning-the-internet
Defcon 22-graham-mc millan-tentler-masscaning-the-internetDefcon 22-graham-mc millan-tentler-masscaning-the-internet
Defcon 22-graham-mc millan-tentler-masscaning-the-internet
 
Defcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-onDefcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-on
 
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-loveDefcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
 
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-aDefcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networks
 

Ähnlich wie Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi

Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
Yury Chemerkin
 
AFIRS presentation 10-07-2014-2
AFIRS presentation 10-07-2014-2AFIRS presentation 10-07-2014-2
AFIRS presentation 10-07-2014-2
Richard Hayden
 

Ähnlich wie Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi (20)

Cyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or FictionCyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or Fiction
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
HUN Hackersuli - How to hack an airplane
HUN Hackersuli - How to hack an airplaneHUN Hackersuli - How to hack an airplane
HUN Hackersuli - How to hack an airplane
 
AFIRS presentation 10-07-2014-2
AFIRS presentation 10-07-2014-2AFIRS presentation 10-07-2014-2
AFIRS presentation 10-07-2014-2
 
radwanS CV AGL
radwanS CV AGLradwanS CV AGL
radwanS CV AGL
 
SIMATIC manager ŰłÙŠÙ…Ű§ŰȘك Ù…Ù†ŰŹŰ± ŰłÙŠÙ…Ù†ŰČ
SIMATIC manager ŰłÙŠÙ…Ű§ŰȘك Ù…Ù†ŰŹŰ± ŰłÙŠÙ…Ù†ŰČSIMATIC manager ŰłÙŠÙ…Ű§ŰȘك Ù…Ù†ŰŹŰ± ŰłÙŠÙ…Ù†ŰČ
SIMATIC manager ŰłÙŠÙ…Ű§ŰȘك Ù…Ù†ŰŹŰ± ŰłÙŠÙ…Ù†ŰČ
 
DEF CON 23 - Phil Polstra - hacker in the wires
DEF CON 23 - Phil Polstra - hacker in the wiresDEF CON 23 - Phil Polstra - hacker in the wires
DEF CON 23 - Phil Polstra - hacker in the wires
 
Kernel Recipes 2015 - The Dronecode Project – A step in open source drones
Kernel Recipes 2015 - The Dronecode Project – A step in open source dronesKernel Recipes 2015 - The Dronecode Project – A step in open source drones
Kernel Recipes 2015 - The Dronecode Project – A step in open source drones
 
Understanding and Improving Device Access Complexity
Understanding and Improving Device Access ComplexityUnderstanding and Improving Device Access Complexity
Understanding and Improving Device Access Complexity
 
A Simplex Architecture for Intelligent and Safe Unmanned Aerial Vehicles
A Simplex Architecture for Intelligent and Safe Unmanned Aerial VehiclesA Simplex Architecture for Intelligent and Safe Unmanned Aerial Vehicles
A Simplex Architecture for Intelligent and Safe Unmanned Aerial Vehicles
 
ANSYS SCADE Usage for Unmanned Aircraft Vehicles
ANSYS SCADE Usage for Unmanned Aircraft VehiclesANSYS SCADE Usage for Unmanned Aircraft Vehicles
ANSYS SCADE Usage for Unmanned Aircraft Vehicles
 
iPad pilot proficiency check: How to fly like a pro with your iPad
iPad pilot proficiency check: How to fly like a pro with your iPadiPad pilot proficiency check: How to fly like a pro with your iPad
iPad pilot proficiency check: How to fly like a pro with your iPad
 
Drone sUAV Forensics
Drone sUAV ForensicsDrone sUAV Forensics
Drone sUAV Forensics
 
Bring Out the Best in Embedded Computing
Bring Out the Best in Embedded ComputingBring Out the Best in Embedded Computing
Bring Out the Best in Embedded Computing
 
UplinQ - bring out the best in embedded computing
UplinQ - bring out the best in embedded computingUplinQ - bring out the best in embedded computing
UplinQ - bring out the best in embedded computing
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh
 
SCSI-3 PGR Support on Symm
SCSI-3 PGR Support on SymmSCSI-3 PGR Support on Symm
SCSI-3 PGR Support on Symm
 
Avionics System Standards.pdf
Avionics System Standards.pdfAvionics System Standards.pdf
Avionics System Standards.pdf
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
 

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

KĂŒrzlich hochgeladen

KĂŒrzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi

  • 1. Cyber-hijacking Airplanes: Truth or Fiction? Dr. Phil of Bloomsburg University @ppolstra http://philpolstra.com Captain Polly of University of <redacted> @CaptPolly
  • 2. Why This Talk? ● Lots of bold claims concerning the feasibility of cyber-hijacking ● Bold claims get lots of press ● Most people don't know enough to evaluate these claims ● Whether you feel safer or even more scared should be based on facts
  • 3. Who is Dr. Phil ● You may know me as a hardware hacker, but I'm also... – Holder of 12 aviation ratings, all current, including: ● Commercial Pilot ● Flight Instructor ● Aircraft Mechanic ● Inspection Authorization holder ● Avionics Technician – Have thousands of hours of flight time – Aircraft builder – Have worked on the development of avionics found in modern airliners – Have access to airliner manuals, current and former airline pilots
  • 4. Who is Captain Polly ● Former airline pilot for a major US carrier ● Thousands of hours in airliners and small aircraft ● Aviation professor ● Head of college simulator program ● Spouse of a current airline pilot
  • 5. What you will learn ● How some of the common aircraft systems really work, including: – ADS-B – ADS-A – ACARS – Transponders – Collision avoidance – GPS – Autopilots – Avionics buses and networks – Attacks being presented by others
  • 6. Some commonly discussed attacks ● Hacking into the avionics via the entertainment network ● Hacking ADS-B ● Hacking engine systems ● Hacking ACARS
  • 7. Let's get this out of the way to start ● You cannot override the pilot ● All aircraft feature unhackable mechanical backup instruments ● You can affect the autopilot operation – If pilot(s) notice they will disconnect – Anything you attempt will likely result in alerts
  • 8. Attacking avionics networks ● Older aircraft use ARINC 429 networks – Not connected to anything useful – Require specialized hardware ● Newer aircraft use a modified version of Ethernet known as ARINC 664 or AFDX
  • 9. ARINC 664 and AFDX ● Built on Ethernet, but... – Can't just start sending packets – Never wireless – Some security in place ● Not connected to entertainment system ● Not connected to in-flight wifi
  • 10. Meet ARINC 664 aka AFDX ● Based on ARINC 629 – First created by Boeing for 777 ● Allows the use of common off the shelf (COTS) components vs ARINC 429 which is proprietary ● Built on Ethernet, but not the same – Uses redundant channels – Assigns time slices to avoid collisions and make it deterministic
  • 11. ARINC 664 Virtual Links ● Unidirectional logical pipe ● 1 and only 1 sender ● 1 or more receiver ● Timeslicing is used to avoid collisions – Bandwidth Allocation Gap (BAG) determines size of timeslice – Jitter (max latency – min latency) determined by number of VL and BAG
  • 13. ARINC 664 in real life
  • 15. Entertainment Systems ● Connected to output ports on GPS and FMS or through a Network Extension Device (NED) ● Never connected to ARINC 429/629/664 ● Remember that the avionics network is never wireless and not compatible with your friendly TCP/IP
  • 16. Boeing 777 Confusion ● Boeing asked for a special condition to allow the passenger information network to be connected to other networks such as the aircraft information network ● FAA granted this special condition on 11/18/13 provided that a network extension device (NED) was used and certain conditions were met
  • 17. 777 Confusion (contd) FAA specified: ● The applicant must ensure that the design provides isolation from, or airplane electronic system security protection against, access by unauthorized sources internal to the airplane. The design must prevent inadvertent and malicious changes to, and all adverse impacts upon, airplane equipment, systems, networks, or other assets required for safe flight and operations.
  • 18. Meet NED the Network Extension Device ● Essentially a gateway that goes between ARINC 429/629/664 and IP ● Like any gateway each path must be programmed ● FMS does not receive input from NED – Cannot send bogus commands to FMS – If NED is compromised may be possible to impersonate another device
  • 19. Example NED implementation ● Shameless used from http://www.teledynecontrols.com/productsolution/ned/blockdiagram.asp
  • 20. MH370? ● A Boeing 777 ● Uses ARINC 629 – Not 664 we've been discussing – Really not Ethernet ● The 777 is essentially the only plane to use ARINC 629 – Harder to hack than ARINC 664
  • 22. Hacking In-flight Wireless ● <video on attacking avionics networks via in-flight wireless>
  • 23. Attacking ADS-B/ADS-A ● Can create phantom aircraft ● No security in protocol ● Could create fake weather reports ● Could be jammed ● Not likely to affect TCAS
  • 24. ADS-B (broadcast) ● Piloted in Alaska ● Intended to improve flying where RADAR coverage is limited ● Part of a Free Flight system planned for the future ● Provides traffic and weather where available ● Used by small planes to broadcast position information
  • 25. ADS-A (addressable) ● What the airlines use (contrary to what you may have heard) ● Related to ACARS ● ADS-B == cable-ready TV ● ADA-A == addressable cable box with pay-per-view, etc – Allows specific airplanes to send/receive messages – Allows lower separation outside of RADAR coverage – Airliners use neither ADS-B or ADS-A for collision avoidance
  • 26. Collision Avoidance ● TIS-B – Provided by ATC – Requires a mode S transponder (ADS-B in) – Only available in some areas – Not authoritative – Does not use ADS-B signals – ATC does not automatically relay every ADS-B signal they receive
  • 27. Collision Avoidance (contd) ● TCAD – Used in small planes – Provides information – Not authoritative ● TCAS – What the big boys (biz jet and up) use
  • 28. TCAS ● Uses transponders in the area ● Can actively interrogate other transponders ● Authoritative ● Pilot can use even if other aircraft not in sight
  • 29. Transponders ● Supplement primary RADAR ● Mode S used in ADS-B ● Airliners have at least 2 ● Signals are used for collision avoidance
  • 30. Attacking ADS-B ● <video of ADS-B attack in simulator>
  • 31. If you could attack ADS-B ● <video of what ADS-B attack would look like if it really worked>
  • 32. Attacking engine systems ● Engine monitors are output only – Information is recorded for maintenance – Some information may be sent via ACARS to airline and/or manufacturer ● Some engine control systems are electronic – All have purely mechanical backup – Most only trim mechanical system electronically
  • 33. ACARS ● Can be used to send messages to/from ground ● Messages to/from people or systems ● Used for – Weather – Delays – Updated flight plans – Maintenance information
  • 34. Attacking ACARS ● Could create a bogus flight plan update ● Could create bogus weather ● Hypothetically could create fake messages from plane to ground ● Not a practical way to take over an airplane
  • 35. ACARS Attack ● <video showing a bogus flight plan update via ACARS>
  • 36. Closing Thoughts ● Nearly every protocol used in aviation is unsecured ● There is certainly the potential to annoy ATC and/or small aircraft ● Increasing automation while continuing with unsecured protocols is problematic ● Airliners are relatively safe (for now)
  • 37. Questions? Come see us after or hit us on Twitter at @ppolstra or @CaptPolly