On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities
Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, a...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Berges, Paul M Shivakumar, Basavesh Ammanaghatta Graziano, Timothy Gerdes, Ryan Celik, Z. Berkay |
description | Traffic Collision Avoidance Systems (TCAS) are safety-critical systems
required on most commercial aircrafts in service today. However, TCAS was not
designed to account for malicious actors. While in the past it may have been
infeasible for an attacker to craft radio signals to mimic TCAS signals,
attackers today have access to open-source digital signal processing software,
like GNU Radio, and inexpensive software defined radios (SDR) that enable the
transmission of spurious TCAS messages. In this paper, methods, both
qualitative and quantitative, for analyzing TCAS from an adversarial
perspective are presented. To demonstrate the feasibility of inducing near
mid-air collisions between current day TCAS-equipped aircraft, an experimental
Phantom Aircraft generator is developed using GNU Radio and an SDR against a
realistic threat model. |
doi_str_mv | 10.48550/arxiv.2006.14679 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2006_14679</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2006_14679</sourcerecordid><originalsourceid>FETCH-LOGICAL-a679-602c44e0a1012a55e139b84feabd69e0a0d9a1a744365acfea0f4079a006ab1b3</originalsourceid><addsrcrecordid>eNotj71qwzAUhbV0KGkfoFP1AnYlW5KjMZikLQQyxHQ1V7aUXFCkYLkhfvu6bqcDB87PR8gLZ7lYS8neYLjjLS8YUzkXqtKP5HgIdDxburOQ0KDHcaLR0e396iOOGE60GcA57GgdvceEMdDNLWIPobP0OKXRXujXtw92gCWONj2RBwc-2ed_XZFmt23qj2x_eP-sN_sM5ulMsaITwjLgjBcgpeWlNmvhLJhe6dlnvQYOlRClktDNPnOCVRrm92C4KVfk9a92oWqvA15gmNpfunahK38Af2lLTQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><source>arXiv.org</source><creator>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</creator><creatorcontrib>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</creatorcontrib><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems
required on most commercial aircrafts in service today. However, TCAS was not
designed to account for malicious actors. While in the past it may have been
infeasible for an attacker to craft radio signals to mimic TCAS signals,
attackers today have access to open-source digital signal processing software,
like GNU Radio, and inexpensive software defined radios (SDR) that enable the
transmission of spurious TCAS messages. In this paper, methods, both
qualitative and quantitative, for analyzing TCAS from an adversarial
perspective are presented. To demonstrate the feasibility of inducing near
mid-air collisions between current day TCAS-equipped aircraft, an experimental
Phantom Aircraft generator is developed using GNU Radio and an SDR against a
realistic threat model.</description><identifier>DOI: 10.48550/arxiv.2006.14679</identifier><language>eng</language><subject>Computer Science - Computers and Society ; Computer Science - Systems and Control</subject><creationdate>2020-06</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2006.14679$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2006.14679$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z. Berkay</creatorcontrib><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems
required on most commercial aircrafts in service today. However, TCAS was not
designed to account for malicious actors. While in the past it may have been
infeasible for an attacker to craft radio signals to mimic TCAS signals,
attackers today have access to open-source digital signal processing software,
like GNU Radio, and inexpensive software defined radios (SDR) that enable the
transmission of spurious TCAS messages. In this paper, methods, both
qualitative and quantitative, for analyzing TCAS from an adversarial
perspective are presented. To demonstrate the feasibility of inducing near
mid-air collisions between current day TCAS-equipped aircraft, an experimental
Phantom Aircraft generator is developed using GNU Radio and an SDR against a
realistic threat model.</description><subject>Computer Science - Computers and Society</subject><subject>Computer Science - Systems and Control</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj71qwzAUhbV0KGkfoFP1AnYlW5KjMZikLQQyxHQ1V7aUXFCkYLkhfvu6bqcDB87PR8gLZ7lYS8neYLjjLS8YUzkXqtKP5HgIdDxburOQ0KDHcaLR0e396iOOGE60GcA57GgdvceEMdDNLWIPobP0OKXRXujXtw92gCWONj2RBwc-2ed_XZFmt23qj2x_eP-sN_sM5ulMsaITwjLgjBcgpeWlNmvhLJhe6dlnvQYOlRClktDNPnOCVRrm92C4KVfk9a92oWqvA15gmNpfunahK38Af2lLTQ</recordid><startdate>20200625</startdate><enddate>20200625</enddate><creator>Berges, Paul M</creator><creator>Shivakumar, Basavesh Ammanaghatta</creator><creator>Graziano, Timothy</creator><creator>Gerdes, Ryan</creator><creator>Celik, Z. Berkay</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200625</creationdate><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><author>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z. Berkay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a679-602c44e0a1012a55e139b84feabd69e0a0d9a1a744365acfea0f4079a006ab1b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Computers and Society</topic><topic>Computer Science - Systems and Control</topic><toplevel>online_resources</toplevel><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z. Berkay</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Berges, Paul M</au><au>Shivakumar, Basavesh Ammanaghatta</au><au>Graziano, Timothy</au><au>Gerdes, Ryan</au><au>Celik, Z. Berkay</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</atitle><date>2020-06-25</date><risdate>2020</risdate><abstract>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems
required on most commercial aircrafts in service today. However, TCAS was not
designed to account for malicious actors. While in the past it may have been
infeasible for an attacker to craft radio signals to mimic TCAS signals,
attackers today have access to open-source digital signal processing software,
like GNU Radio, and inexpensive software defined radios (SDR) that enable the
transmission of spurious TCAS messages. In this paper, methods, both
qualitative and quantitative, for analyzing TCAS from an adversarial
perspective are presented. To demonstrate the feasibility of inducing near
mid-air collisions between current day TCAS-equipped aircraft, an experimental
Phantom Aircraft generator is developed using GNU Radio and an SDR against a
realistic threat model.</abstract><doi>10.48550/arxiv.2006.14679</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2006.14679 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2006_14679 |
source | arXiv.org |
subjects | Computer Science - Computers and Society Computer Science - Systems and Control |
title | On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T08%3A35%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Feasibility%20of%20Exploiting%20Traffic%20Collision%20Avoidance%20System%20Vulnerabilities&rft.au=Berges,%20Paul%20M&rft.date=2020-06-25&rft_id=info:doi/10.48550/arxiv.2006.14679&rft_dat=%3Carxiv_GOX%3E2006_14679%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |