Sydney Airport Message Board Sydney Airport Message Board  

Go Back   Sydney Airport Message Board > Aviation Industry News and Discussion > International Industry
Register FAQ Calendar Today's Posts Search


Reply
 
Thread Tools Search this Thread Display Modes
  #1  
Old 12th April 2013, 02:16 PM
David Knudsen David Knudsen is offline
Administrator
 
Join Date: Mar 2008
Location: Brisbane
Posts: 714
Default Article: Can a Hacker Hijack a Plane With an Android App?

From http://mashable.com/2013/04/11/hacke...e-android-app/

Quote:
Can a Hacker Hijack a Plane With an Android App?
By Lorenzo Franceschi-Bicchierai

Imagine the kind of havoc a malicious hacker could cause if he or she were able to take over an airplane simply using his Android phone. With a tap of his or her fingers, the hacker could arbitrarily control the plane remotely and redirect its path. If you think this is only something that could happen in a Hollywood movie, think again, because that's exactly the scenario a German security researcher laid out on Wednesday at a conference in Amsterdam.

Hugo Teso, a security researcher for the German IT consultancy firm N.Runs — he is a trained commercial pilot as well — explained at the Hack in the Box security conference that a protocol used to transmit data to commercial airplanes can be hacked, turning the hacker into a full-fledged hijacker.

The flawed protocol is a data exchange system called Aircraft Communications Addressing and Report System, or ACARS. Exploiting its flaws, as well as the bugs found in flight management software made by companies like Honeywell, Thales, and Rockwell Collins, Teso maintains he can take over a plane by sending it his own malicious radio signals. To do that, he has created an exploit framework, codenamed SIMON, and an Android app called PlaneSploit that can communicate with the airplanes' Flight Management Systems (FMS).

"You can use this system to modify approximately everything related to the navigation of the plane," Teso told Forbes' Andy Greenberg in an interview. "That includes a lot of nasty things."


The key to Teso's hack is that ACARS doesn't have any encryption or authentication features, so the plane can't distinguish between signals that are coming from a hacker or an airport's ground station. That way, he or she could potentially send spoofed malicious signals to affect the behavior of the plane. In the presentation (see the slides here), Teso showed how he could control a virtual plane using the Android app he developed, and explained that he experimented on hardware purchased on eBay along with FMS training simulation software.

Authorities like the Federal Aviation Administration (FAA), as well as Honeywell, however, don't believe his hack could be reproduced in real life.

In a statement sent to Mashable, the FAA said it is aware of Teso's presentation on Wednesday, but noted that the "hacking technique" he described "does not pose a flight safety concern because it does not work on certified flight hardware."

In fact, "the described technique cannot engage or control the aircraft’s autopilot system using the FMS or prevent a pilot from overriding the autopilot," the statement continues. "Therefore, a hacker cannot obtain 'full control of an aircraft' as the technology consultant has claimed."

Honeywell, on its part, has expressed the same view. "As Teso readily admits, the version he used of our flight management system is a publicly available PC simulation, and that doesn’t have the same protections against overwriting or corrupting as our certified flight software," Honeywell spokesperson Scott Sayres told Forbes. Teso's fellow security researcher and supervisor Roland Ehlies counters that the hack "would work with at minimum a bit of adaptation" on real planes and software.

Either way, both Teso and Sayres agree that whatever a hacker might do, the pilots could be able to override the malicious commands on board. In any case, instead of hijacking the plane, the hacker might still be able to make the cockpit's lights blink wildly or the passenger's pressurized air masks drop.

Even if Teso's hack proves not to be reproducible on real planes, some of the flaws he exposed could still cause issues. And this is not the first time security researchers and hackers have exposed serious flaws in modern aviation systems.

Last year, at the famed Black Hat security conference in Las Vegas, another researcher showed the vulnerabilities of the next generation air traffic control system, the Automatic Dependent Surveillance-Broadcast (ADS-B). In his presentation, Andrei Costin, a doctoral candidate in France, showed that it was possible to send and inject spoofed messages into the systems, making imaginary planes appear on the screens of air traffic controllers.

Update, 6:47 p.m.: The European Aviation Safety Agency (EASA) is in accordance with its American counterpart and Honeywell in downplaying the hack. In an email statement to Mashable Jeremie Teahan, an EASA spokesperson, said that "this presentation was based on a PC training simulator and did not reveal potential vulnerabilities on actual flying systems," and "in particular, the FMS simulation software does not have the same overwriting protection and redundancies that is included in the certified flight software."
__________________
- Dave

Jetphotos.net Shots
Airliners.net Shots
Reply With Quote
  #2  
Old 26th April 2013, 10:00 AM
Kazuya H Kazuya H is offline
Member
 
Join Date: Apr 2013
Posts: 13
Default

I got in touch with the Comms manager for Honeywell Aerospace about this and was quite surprised with his response. I asked whether ARINC or SITA that provide the ACARS communication services to aircraft don't have encryption available on the links. I know that ARINC has various standards already in place, but not sure whether they are commonly used outside the US on commercial aircraft. They also provide secure comm-links for various security/military/emergency industries, but as far as I know SITA is more commonly used outside the US.

His response: "I will pass this on to our engineers for comment".

It is interesting to note about the aviation journalists that get their reporting wrong, like the United incident in Melbourne recently, but when you stand back and look at the bigger picture the PR people of the aviation companies also have their shortcomings when dealing with the journos. Makes me want to take my hobby and become either an aviation journalist or PR "dude" for an aviation/airline/airport company.

Any advice on how to pursue such an endeavour with no experience apart from my interest in airplanes/airlines?
Reply With Quote
  #3  
Old 26th April 2013, 11:47 AM
Kazuya H Kazuya H is offline
Member
 
Join Date: Apr 2013
Posts: 13
Default

The presentation is here:
https://docs.google.com/viewer?url=h...o%20Series.pdf
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time now is 09:32 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Copyright © Sydney Airport Message Board 1997-2022
Use of this web site constitutes acceptance of the Conditions of Use and Privacy Statement