Ghost is in the Air - Traffic - Security Aspects of ADS-B and "Flying" Technology
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security vulnerabilities of ADS-B (Automatic Dependent Surveillance-Broadcast) and emerging air traffic control technologies in this Black Hat USA 2012 conference talk. Delve into the potential risks associated with technological advancements in aviation, drawing parallels to the mobile communication networks and smartphones evolution. Examine practical techniques that attackers could exploit to generate and inject false air traffic data, potentially compromising air traffic control systems. Learn about the current state of ADS-B implementation in Australia and the USA, and understand the perspectives of users and the aviation community. Analyze technical aspects, possible threats, and mitigation strategies for ADS-B security issues. Discover the implications of publicly available flight data and the challenges posed by false data injection, fake airplane generation, and denial of service attacks. Witness a demonstration of verifiable multilateration and gain insights into open issues surrounding ADS-B technology.
Syllabus
Introduction
About me
Feedback
Agenda
ATC
Rudders
transponders
transporter transponder
secondary surveillance display
problems in ATC
inputs are not very robust
input mistakes
more input problems
what is ATC
what is ADSB
Security
ADSB In
Australia
USA
User perspective
Community perspective
Technical Aspects
Possible Threats
Entity Message Identification
Mitigations
Prankster Attack
External Criminals
Public Data
Downloadable Data
Groundbased
Air Force One
Open Issues
False Data
Fake Airplane Injection
Denial of Service
Problems with ADSB
References
Data Visualization
Demonstration
Demo Detail
verifiable multilateration
conclusion
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network