YoVDO

Ghost is in the Air - Traffic - Security Aspects of ADS-B and "Flying" Technology

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Data Visualization Courses Cybersecurity Courses Threat Identification Courses

Course Description

Overview

Explore the security vulnerabilities of ADS-B (Automatic Dependent Surveillance-Broadcast) and emerging air traffic control technologies in this Black Hat USA 2012 conference talk. Delve into the potential risks associated with technological advancements in aviation, drawing parallels to the mobile communication networks and smartphones evolution. Examine practical techniques that attackers could exploit to generate and inject false air traffic data, potentially compromising air traffic control systems. Learn about the current state of ADS-B implementation in Australia and the USA, and understand the perspectives of users and the aviation community. Analyze technical aspects, possible threats, and mitigation strategies for ADS-B security issues. Discover the implications of publicly available flight data and the challenges posed by false data injection, fake airplane generation, and denial of service attacks. Witness a demonstration of verifiable multilateration and gain insights into open issues surrounding ADS-B technology.

Syllabus

Introduction
About me
Feedback
Agenda
ATC
Rudders
transponders
transporter transponder
secondary surveillance display
problems in ATC
inputs are not very robust
input mistakes
more input problems
what is ATC
what is ADSB
Security
ADSB In
Australia
USA
User perspective
Community perspective
Technical Aspects
Possible Threats
Entity Message Identification
Mitigations
Prankster Attack
External Criminals
Public Data
Downloadable Data
Groundbased
Air Force One
Open Issues
False Data
Fake Airplane Injection
Denial of Service
Problems with ADSB
References
Data Visualization
Demonstration
Demo Detail
verifiable multilateration
conclusion


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network