On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2020-06
Hauptverfasser: Berges, Paul M, Shivakumar, Basavesh Ammanaghatta, Graziano, Timothy, Gerdes, Ryan, Celik, Z Berkay
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Berges, Paul M
Shivakumar, Basavesh Ammanaghatta
Graziano, Timothy
Gerdes, Ryan
Celik, Z Berkay
description Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2418455866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2418455866</sourcerecordid><originalsourceid>FETCH-proquest_journals_24184558663</originalsourceid><addsrcrecordid>eNqNi0ELgjAYQEcQJOV_-KCzoNOZ1xClWwelqyzb6pO12TYj_30R_YBO7_DeW5CApmkSFRmlKxI6N8RxTPMdZSwNSHPU4G8CasEdnlGhn8FIqF6jMuhRX6G1XErsoTRKoUOjYf80eOG6F9DMzos7nCalheXfHYXbkKXkyonwxzXZ1lVbHqLRmscknO8GM1n9UR3NkiJjrMjz9L_qDUT3QHE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2418455866</pqid></control><display><type>article</type><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><source>Free E- Journals</source><creator>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</creator><creatorcontrib>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</creatorcontrib><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Aircraft accidents &amp; safety ; Collision avoidance ; Commercial aircraft ; Digital signal processing ; Feasibility ; Midair collisions ; Qualitative analysis ; Radio signals ; Radios ; Safety critical ; Signal processing ; Software ; Software radio ; Source code ; Traffic safety</subject><ispartof>arXiv.org, 2020-06</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z Berkay</creatorcontrib><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><title>arXiv.org</title><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><subject>Aircraft accidents &amp; safety</subject><subject>Collision avoidance</subject><subject>Commercial aircraft</subject><subject>Digital signal processing</subject><subject>Feasibility</subject><subject>Midair collisions</subject><subject>Qualitative analysis</subject><subject>Radio signals</subject><subject>Radios</subject><subject>Safety critical</subject><subject>Signal processing</subject><subject>Software</subject><subject>Software radio</subject><subject>Source code</subject><subject>Traffic safety</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNi0ELgjAYQEcQJOV_-KCzoNOZ1xClWwelqyzb6pO12TYj_30R_YBO7_DeW5CApmkSFRmlKxI6N8RxTPMdZSwNSHPU4G8CasEdnlGhn8FIqF6jMuhRX6G1XErsoTRKoUOjYf80eOG6F9DMzos7nCalheXfHYXbkKXkyonwxzXZ1lVbHqLRmscknO8GM1n9UR3NkiJjrMjz9L_qDUT3QHE</recordid><startdate>20200625</startdate><enddate>20200625</enddate><creator>Berges, Paul M</creator><creator>Shivakumar, Basavesh Ammanaghatta</creator><creator>Graziano, Timothy</creator><creator>Gerdes, Ryan</creator><creator>Celik, Z Berkay</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200625</creationdate><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><author>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_24184558663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Aircraft accidents &amp; safety</topic><topic>Collision avoidance</topic><topic>Commercial aircraft</topic><topic>Digital signal processing</topic><topic>Feasibility</topic><topic>Midair collisions</topic><topic>Qualitative analysis</topic><topic>Radio signals</topic><topic>Radios</topic><topic>Safety critical</topic><topic>Signal processing</topic><topic>Software</topic><topic>Software radio</topic><topic>Source code</topic><topic>Traffic safety</topic><toplevel>online_resources</toplevel><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z Berkay</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Berges, Paul M</au><au>Shivakumar, Basavesh Ammanaghatta</au><au>Graziano, Timothy</au><au>Gerdes, Ryan</au><au>Celik, Z Berkay</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</atitle><jtitle>arXiv.org</jtitle><date>2020-06-25</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2020-06
issn 2331-8422
language eng
recordid cdi_proquest_journals_2418455866
source Free E- Journals
subjects Aircraft accidents & safety
Collision avoidance
Commercial aircraft
Digital signal processing
Feasibility
Midair collisions
Qualitative analysis
Radio signals
Radios
Safety critical
Signal processing
Software
Software radio
Source code
Traffic safety
title On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T21%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=On%20the%20Feasibility%20of%20Exploiting%20Traffic%20Collision%20Avoidance%20System%20Vulnerabilities&rft.jtitle=arXiv.org&rft.au=Berges,%20Paul%20M&rft.date=2020-06-25&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2418455866%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2418455866&rft_id=info:pmid/&rfr_iscdi=true