On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Berges, Paul M, Shivakumar, Basavesh Ammanaghatta, Graziano, Timothy, Gerdes, Ryan, Celik, Z. Berkay
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Berges, Paul M
Shivakumar, Basavesh Ammanaghatta
Graziano, Timothy
Gerdes, Ryan
Celik, Z. Berkay
description Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.
doi_str_mv 10.48550/arxiv.2006.14679
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2006_14679</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2006_14679</sourcerecordid><originalsourceid>FETCH-LOGICAL-a679-602c44e0a1012a55e139b84feabd69e0a0d9a1a744365acfea0f4079a006ab1b3</originalsourceid><addsrcrecordid>eNotj71qwzAUhbV0KGkfoFP1AnYlW5KjMZikLQQyxHQ1V7aUXFCkYLkhfvu6bqcDB87PR8gLZ7lYS8neYLjjLS8YUzkXqtKP5HgIdDxburOQ0KDHcaLR0e396iOOGE60GcA57GgdvceEMdDNLWIPobP0OKXRXujXtw92gCWONj2RBwc-2ed_XZFmt23qj2x_eP-sN_sM5ulMsaITwjLgjBcgpeWlNmvhLJhe6dlnvQYOlRClktDNPnOCVRrm92C4KVfk9a92oWqvA15gmNpfunahK38Af2lLTQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><source>arXiv.org</source><creator>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</creator><creatorcontrib>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</creatorcontrib><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><identifier>DOI: 10.48550/arxiv.2006.14679</identifier><language>eng</language><subject>Computer Science - Computers and Society ; Computer Science - Systems and Control</subject><creationdate>2020-06</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2006.14679$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2006.14679$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z. Berkay</creatorcontrib><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><subject>Computer Science - Computers and Society</subject><subject>Computer Science - Systems and Control</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj71qwzAUhbV0KGkfoFP1AnYlW5KjMZikLQQyxHQ1V7aUXFCkYLkhfvu6bqcDB87PR8gLZ7lYS8neYLjjLS8YUzkXqtKP5HgIdDxburOQ0KDHcaLR0e396iOOGE60GcA57GgdvceEMdDNLWIPobP0OKXRXujXtw92gCWONj2RBwc-2ed_XZFmt23qj2x_eP-sN_sM5ulMsaITwjLgjBcgpeWlNmvhLJhe6dlnvQYOlRClktDNPnOCVRrm92C4KVfk9a92oWqvA15gmNpfunahK38Af2lLTQ</recordid><startdate>20200625</startdate><enddate>20200625</enddate><creator>Berges, Paul M</creator><creator>Shivakumar, Basavesh Ammanaghatta</creator><creator>Graziano, Timothy</creator><creator>Gerdes, Ryan</creator><creator>Celik, Z. Berkay</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200625</creationdate><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><author>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a679-602c44e0a1012a55e139b84feabd69e0a0d9a1a744365acfea0f4079a006ab1b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Computers and Society</topic><topic>Computer Science - Systems and Control</topic><toplevel>online_resources</toplevel><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z. Berkay</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Berges, Paul M</au><au>Shivakumar, Basavesh Ammanaghatta</au><au>Graziano, Timothy</au><au>Gerdes, Ryan</au><au>Celik, Z. Berkay</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</atitle><date>2020-06-25</date><risdate>2020</risdate><abstract>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</abstract><doi>10.48550/arxiv.2006.14679</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2006.14679
ispartof
issn
language eng
recordid cdi_arxiv_primary_2006_14679
source arXiv.org
subjects Computer Science - Computers and Society
Computer Science - Systems and Control
title On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T08%3A35%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Feasibility%20of%20Exploiting%20Traffic%20Collision%20Avoidance%20System%20Vulnerabilities&rft.au=Berges,%20Paul%20M&rft.date=2020-06-25&rft_id=info:doi/10.48550/arxiv.2006.14679&rft_dat=%3Carxiv_GOX%3E2006_14679%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true