On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities
Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, a...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2020-06 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Berges, Paul M Shivakumar, Basavesh Ammanaghatta Graziano, Timothy Gerdes, Ryan Celik, Z Berkay |
description | Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2418455866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2418455866</sourcerecordid><originalsourceid>FETCH-proquest_journals_24184558663</originalsourceid><addsrcrecordid>eNqNi0ELgjAYQEcQJOV_-KCzoNOZ1xClWwelqyzb6pO12TYj_30R_YBO7_DeW5CApmkSFRmlKxI6N8RxTPMdZSwNSHPU4G8CasEdnlGhn8FIqF6jMuhRX6G1XErsoTRKoUOjYf80eOG6F9DMzos7nCalheXfHYXbkKXkyonwxzXZ1lVbHqLRmscknO8GM1n9UR3NkiJjrMjz9L_qDUT3QHE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2418455866</pqid></control><display><type>article</type><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><source>Free E- Journals</source><creator>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</creator><creatorcontrib>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</creatorcontrib><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Aircraft accidents & safety ; Collision avoidance ; Commercial aircraft ; Digital signal processing ; Feasibility ; Midair collisions ; Qualitative analysis ; Radio signals ; Radios ; Safety critical ; Signal processing ; Software ; Software radio ; Source code ; Traffic safety</subject><ispartof>arXiv.org, 2020-06</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z Berkay</creatorcontrib><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><title>arXiv.org</title><description>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</description><subject>Aircraft accidents & safety</subject><subject>Collision avoidance</subject><subject>Commercial aircraft</subject><subject>Digital signal processing</subject><subject>Feasibility</subject><subject>Midair collisions</subject><subject>Qualitative analysis</subject><subject>Radio signals</subject><subject>Radios</subject><subject>Safety critical</subject><subject>Signal processing</subject><subject>Software</subject><subject>Software radio</subject><subject>Source code</subject><subject>Traffic safety</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNi0ELgjAYQEcQJOV_-KCzoNOZ1xClWwelqyzb6pO12TYj_30R_YBO7_DeW5CApmkSFRmlKxI6N8RxTPMdZSwNSHPU4G8CasEdnlGhn8FIqF6jMuhRX6G1XErsoTRKoUOjYf80eOG6F9DMzos7nCalheXfHYXbkKXkyonwxzXZ1lVbHqLRmscknO8GM1n9UR3NkiJjrMjz9L_qDUT3QHE</recordid><startdate>20200625</startdate><enddate>20200625</enddate><creator>Berges, Paul M</creator><creator>Shivakumar, Basavesh Ammanaghatta</creator><creator>Graziano, Timothy</creator><creator>Gerdes, Ryan</creator><creator>Celik, Z Berkay</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200625</creationdate><title>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</title><author>Berges, Paul M ; Shivakumar, Basavesh Ammanaghatta ; Graziano, Timothy ; Gerdes, Ryan ; Celik, Z Berkay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_24184558663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Aircraft accidents & safety</topic><topic>Collision avoidance</topic><topic>Commercial aircraft</topic><topic>Digital signal processing</topic><topic>Feasibility</topic><topic>Midair collisions</topic><topic>Qualitative analysis</topic><topic>Radio signals</topic><topic>Radios</topic><topic>Safety critical</topic><topic>Signal processing</topic><topic>Software</topic><topic>Software radio</topic><topic>Source code</topic><topic>Traffic safety</topic><toplevel>online_resources</toplevel><creatorcontrib>Berges, Paul M</creatorcontrib><creatorcontrib>Shivakumar, Basavesh Ammanaghatta</creatorcontrib><creatorcontrib>Graziano, Timothy</creatorcontrib><creatorcontrib>Gerdes, Ryan</creatorcontrib><creatorcontrib>Celik, Z Berkay</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Berges, Paul M</au><au>Shivakumar, Basavesh Ammanaghatta</au><au>Graziano, Timothy</au><au>Gerdes, Ryan</au><au>Celik, Z Berkay</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities</atitle><jtitle>arXiv.org</jtitle><date>2020-06-25</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive software defined radios (SDR) that enable the transmission of spurious TCAS messages. In this paper, methods, both qualitative and quantitative, for analyzing TCAS from an adversarial perspective are presented. To demonstrate the feasibility of inducing near mid-air collisions between current day TCAS-equipped aircraft, an experimental Phantom Aircraft generator is developed using GNU Radio and an SDR against a realistic threat model.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2020-06 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2418455866 |
source | Free E- Journals |
subjects | Aircraft accidents & safety Collision avoidance Commercial aircraft Digital signal processing Feasibility Midair collisions Qualitative analysis Radio signals Radios Safety critical Signal processing Software Software radio Source code Traffic safety |
title | On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T21%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=On%20the%20Feasibility%20of%20Exploiting%20Traffic%20Collision%20Avoidance%20System%20Vulnerabilities&rft.jtitle=arXiv.org&rft.au=Berges,%20Paul%20M&rft.date=2020-06-25&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2418455866%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2418455866&rft_id=info:pmid/&rfr_iscdi=true |