1. Cyber-hijacking Airplanes:
Truth or Fiction?
Dr. Phil of Bloomsburg University
@ppolstra
http://philpolstra.com
Captain Polly of University of <redacted>
@CaptPolly
2. Why This Talk?
â Lots of bold claims concerning the
feasibility of cyber-hijacking
â Bold claims get lots of press
â Most people don't know enough to
evaluate these claims
â Whether you feel safer or even more
scared should be based on facts
3. Who is Dr. Phil
â You may know me as a hardware hacker, but I'm also...
â Holder of 12 aviation ratings, all current, including:
â Commercial Pilot
â Flight Instructor
â Aircraft Mechanic
â Inspection Authorization holder
â Avionics Technician
â Have thousands of hours of flight time
â Aircraft builder
â Have worked on the development of avionics found in
modern airliners
â Have access to airliner manuals, current and former
airline pilots
4. Who is Captain Polly
â Former airline pilot for a major US
carrier
â Thousands of hours in airliners and
small aircraft
â Aviation professor
â Head of college simulator program
â Spouse of a current airline pilot
5. What you will learn
â How some of the common aircraft systems really
work, including:
â ADS-B
â ADS-A
â ACARS
â Transponders
â Collision avoidance
â GPS
â Autopilots
â Avionics buses and networks
â Attacks being presented by others
6. Some commonly discussed
attacks
â Hacking into the avionics via the
entertainment network
â Hacking ADS-B
â Hacking engine systems
â Hacking ACARS
7. Let's get this out of the way to
start
â You cannot override the pilot
â All aircraft feature unhackable
mechanical backup instruments
â You can affect the autopilot operation
â If pilot(s) notice they will disconnect
â Anything you attempt will likely result in
alerts
8. Attacking avionics networks
â Older aircraft use ARINC 429 networks
â Not connected to anything useful
â Require specialized hardware
â Newer aircraft use a modified version of
Ethernet known as ARINC 664 or AFDX
9. ARINC 664 and AFDX
â Built on Ethernet, but...
â Can't just start sending packets
â Never wireless
â Some security in place
â Not connected to entertainment system
â Not connected to in-flight wifi
10. Meet ARINC 664 aka AFDX
â Based on ARINC 629
â First created by Boeing for 777
â Allows the use of common off the shelf
(COTS) components vs ARINC 429
which is proprietary
â Built on Ethernet, but not the same
â Uses redundant channels
â Assigns time slices to avoid collisions
and make it deterministic
11. ARINC 664 Virtual Links
â Unidirectional logical pipe
â 1 and only 1 sender
â 1 or more receiver
â Timeslicing is used to avoid collisions
â Bandwidth Allocation Gap (BAG)
determines size of timeslice
â Jitter (max latency â min latency)
determined by number of VL and BAG
15. Entertainment Systems
â Connected to output ports on GPS and
FMS or through a Network Extension
Device (NED)
â Never connected to ARINC
429/629/664
â Remember that the avionics network is
never wireless and not compatible with
your friendly TCP/IP
16. Boeing 777 Confusion
â Boeing asked for a special condition to
allow the passenger information
network to be connected to other
networks such as the aircraft
information network
â FAA granted this special condition on
11/18/13 provided that a network
extension device (NED) was used and
certain conditions were met
17. 777 Confusion (contd)
FAA specified:
â The applicant must ensure that the design
provides isolation from, or airplane electronic
system security protection against, access by
unauthorized sources internal to the airplane.
The design must prevent inadvertent and
malicious changes to, and all adverse impacts
upon, airplane equipment, systems, networks,
or other assets required for safe flight and
operations.
18. Meet NED the Network
Extension Device
â Essentially a gateway that goes
between ARINC 429/629/664 and IP
â Like any gateway each path must be
programmed
â FMS does not receive input from NED
â Cannot send bogus commands to FMS
â If NED is compromised may be possible
to impersonate another device
20. MH370?
â A Boeing 777
â Uses ARINC 629
â Not 664 we've been discussing
â Really not Ethernet
â The 777 is essentially the only plane to
use ARINC 629
â Harder to hack than ARINC 664
23. Attacking ADS-B/ADS-A
â Can create phantom aircraft
â No security in protocol
â Could create fake weather reports
â Could be jammed
â Not likely to affect TCAS
24. ADS-B (broadcast)
â Piloted in Alaska
â Intended to improve flying where RADAR
coverage is limited
â Part of a Free Flight system planned for the
future
â Provides traffic and weather where available
â Used by small planes to broadcast position
information
25. ADS-A (addressable)
â What the airlines use (contrary to what you may have
heard)
â Related to ACARS
â ADS-B == cable-ready TV
â ADA-A == addressable cable box with pay-per-view,
etc
â Allows specific airplanes to send/receive messages
â Allows lower separation outside of RADAR
coverage
â Airliners use neither ADS-B or ADS-A for collision
avoidance
26. Collision Avoidance
â TIS-B
â Provided by ATC
â Requires a mode S transponder (ADS-B
in)
â Only available in some areas
â Not authoritative
â Does not use ADS-B signals
â ATC does not automatically relay every
ADS-B signal they receive
27. Collision Avoidance (contd)
â TCAD
â Used in small planes
â Provides information
â Not authoritative
â TCAS
â What the big boys (biz jet and up) use
28. TCAS
â Uses transponders in the area
â Can actively interrogate other
transponders
â Authoritative
â Pilot can use even if other aircraft not in
sight
29. Transponders
â Supplement primary RADAR
â Mode S used in ADS-B
â Airliners have at least 2
â Signals are used for collision avoidance
31. If you could attack ADS-B
â <video of what ADS-B attack would look
like if it really worked>
32. Attacking engine systems
â Engine monitors are output only
â Information is recorded for maintenance
â Some information may be sent via
ACARS to airline and/or manufacturer
â Some engine control systems are
electronic
â All have purely mechanical backup
â Most only trim mechanical system
electronically
33. ACARS
â Can be used to send messages to/from
ground
â Messages to/from people or systems
â Used for
â Weather
â Delays
â Updated flight plans
â Maintenance information
34. Attacking ACARS
â Could create a bogus flight plan update
â Could create bogus weather
â Hypothetically could create fake
messages from plane to ground
â Not a practical way to take over an
airplane
36. Closing Thoughts
â Nearly every protocol used in aviation is
unsecured
â There is certainly the potential to annoy
ATC and/or small aircraft
â Increasing automation while continuing
with unsecured protocols is problematic
â Airliners are relatively safe (for now)