YoVDO

Wireless Attacks on Aircraft Instrument Landing Systems

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Wireless Security Courses Aviation Safety Courses Software-Defined Radio Courses

Course Description

Overview

Explore a critical security presentation from USENIX Security '19 focusing on wireless attacks targeting aircraft instrument landing systems (ILS). Delve into research conducted by Harshad Sathaye from Northeastern University, revealing vulnerabilities in aviation systems that have not been previously examined in open literature. Learn about the feasibility of spoofing ILS radio signals using commercially available software-defined radio (SDR) platforms, potentially causing last-minute go-around decisions and missed landings in low-visibility conditions. Discover how researchers demonstrated fine-grained control over the course deviation indicator on aviation-grade ILS receivers in real-time. Examine the potential of overshadowing attacks and lower-power single-tone attacks on aircraft landing systems. Gain insights into the development of a closed-loop ILS spoofer that adjusts transmitted signals based on aircraft GPS location, potentially causing undetected off-runway landings. Understand the systematic evaluation of these attacks against an FAA-certified flight simulator's AI-based autoland feature, demonstrating successful offset touchdowns ranging from 18 to over 50 meters.

Syllabus

USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems


Taught by

USENIX

Related Courses

Ingeniería de aeropuertos: diseño del lado aire según OACI (ICAO)
Universitat Politècnica de València via edX
Aviation Safety and Reliability
Hong Kong Polytechnic University via edX
Air Safety Investigation
Delft University of Technology via edX
Let’s Read! Learning Japanese through Science & Technology-2
University of Tokyo via Coursera
Human Factors in Aviation
San Diego City College via California Community Colleges System