Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
FAA: 'No, you can't hijack a plane with an Android app' (theregister.co.uk)
64 points by sambeau on April 14, 2013 | hide | past | favorite | 29 comments


It would be nice to get an actual technical rebuttal describing why his stuff doesn't work rather than the sleight-of-hand English and PR responses in that article (The whole "industry standard robustness yada" bit makes my cringe).

Based on their responses it sounds like "Yes, these systems are vulnerable but a good pilot will ignore the bad data so the plane is not vulnerable." which does not exactly give me the warm fuzzies.

(Good point here at the bottom: http://arstechnica.com/security/2013/04/hacking-commercial-a... )

All his hack needs to be able to do is cause problems for the pilot (bad information etc.) for this to be a problem.

I mean, if there is no issue then surely he is now justified in publishing his work and them publishing in detail why it is not a risk.


Brief technical explanation.

The "attack" consists of the following steps:

1) Modify the desktop simulator FMS code to support commands in the data protocols (e.g. ADS-B). 2) Send commands through data link to utilize the newly created control channel.

What FAA is saying that

1) It is hard if not impossible to actually inject un-authorized code into an embedded airplane system (FMS, GPS, ...) due to strict quality controls in place. 2) Even if one succeeds with 1) then you still have limits of what FMS can actually do with the plane because it is a separate unit from other systems with well defined protocols (e.g. FMS doesn't control the lights in the plane).

IMHO, the whole "hack" sounds like a BS/PR action. Yes, you can "fake" GPS, ADS-B, and other communication protocols. However, there are other sources of information for pilots (e.g. the old and true magnetic compass) that can and should be used to validate and cross-reference the data. From a pilot's perspective, a "fake" GPS is no different from a "failed" GPS (yes, this happens). One should be ready to deal with this to qualify as a pilot.


Yep, hit the nail on the head.

Thing is, if you're able to inject un-authorised code into the FMS, chances are you have bigger concerns than a single aircraft getting hijacked.

It's the equivalent of saying "If I had access to a bank's mainframe and network infrastructure, I could steal millions of dollars with an Android App." Sure you could, but is the problem the fact you can do it with an Android App, or the fact you were able to inject the code in the first place?


Exactly. If I have that much capabilities I would buy the airline. It seems neater.


"From a pilot's perspective, a "fake" GPS is no different from a "failed" GPS (yes, this happens)."

Fake and failed are completely different things.

Take for example AF447, it had UNRELIABLE instrument readings which pilots still trusted. Much more dangerous then an instrument giving up it's ghost and it telling you so.

Modifying data subtly enough for it to not trip BS-detector is a valid attack vector.

Of course the rest of the story is theoretical, but so have been many emerging attacks.

I consider this a tool that can in theory be used in combination with other tricks to do something bad. To have it in the open means that the vendors have to put more safeguards in place and make the system safer.


The old vacuum attitude indicators have a tendency to fail in a really slow and subtle way as the gyro slows down. Yet, there are other instruments in the cabin to figure this out. There are rules of how to detect failed or unreliable indicators. It would be really hard (read: impossible) for an attacker to fake all instruments together to show a believable picture.

AF447 crash was caused by not following the procedures for the loss of airspeed reading followed by lack of basic manual flying skills (e.g. complete inability to fly the plane at high altitude w/o autopilot). Read the final report, it's not about instruments, it's about pilots.


I did read the report and disagree with you.

The pilots where inexperienced being in a violent thunderstorm with computers giving intermittent false information. There were no outside visual references. It was a complex set of circumstances that converged.

I have a pilots license and I agree that sitting on a couch, reading the report in retrospective there were cues that could have been interpreted differently, there were procedures that should have been followed more directly and other things that could have been done to prevent oneself to get into this kind of mess in the first place.

BUT. Would I have performed better in the same position? I don't know. Reading crash reports is for educating oneself so you can perform better in the next sticky situation or spot problems a mile away.

Can this attack in the original article crash airplanes alone today? Definite no.

Can it be evolved to play a part in some other foul play sometime in the future? I would not underestimate the inventiveness of people.


I personally had a frozen pitot tube due to failed tube heating in the solid IMC (no thunderstorm though). You just disable autopilot and manually fly by the known manifold pressure numbers, vertical speed and attitude. Plus double check with GPS ground speed (estimating the wind). This is not even an emergency (you have to advise ATC about the situation though).

Things fail all the time. This is why there is redundancy built into the system. A pilot just need to know how to detect the problem and how to use secondary systems.


Even briefer explanation. The attack consists of:

1. Get root on one of the plane's systems somehow.

2. After completing step (1), use this Android app to abuse this to display some messages which the pilot will identify as bogus.


None of the articles I read mentioned that he had actually modified the FMS code. Could you give a link?

If he did that then that is a colossally huge caveat to his claims.


>"Yes, these systems are vulnerable but a good pilot will ignore the bad data so the plane is not vulnerable."

Right, like on Air France Flight 447.

Obligatory Dilbert: http://search.dilbert.com/search?w=Flight++laptop&view=l...


I think what you're describing is more a culture problem than an issue with the design of the FMS or pilots receiving incorrect information from instruments.

Any pilot will tell you the very last thing you want is to be at war with your own aircraft (or its instruments), but incorrect readings should not solely cause an incident. This is also the case with AF447. I'm more likely after reading the CVR to put the incident down to poor communication between the crew (in the industry known as CRM or Crew / Cockpit Resource Management) [1].

The crew failed to effectively communicate what each other were doing, to the extent where they were inputting opposite commands to the flight controls and had a misunderstanding of what conditions triggered certain flight control modes [2] of the Airbus' autopilot.

Coming back to the original point around culture and training, it was evident that the more junior pilots were relying on certain "protections" the autopilot has against conditions like a stall. It's this reliance upon a computer (commanding a full nose-up during a stall) and lack of understanding of how the aircraft's flight computer acts under certain conditions that ultimately ended 228 people's lives. The French investigation concluded that the inconsistency of speed measurements was only one of seven factors that caused the accident.

[1] http://en.wikipedia.org/wiki/Crew_Resource_Management [2] http://en.wikipedia.org/wiki/Flight_control_modes_%28electro...

EDIT: Having said that, I would not want to be the pilot flying an aircraft where I can't trust my own instruments, however there are numerous cases (QF72 [3] comes to mind) where pilots have had to disregard most if not all digital instrument readings and stick to the bare minimum to safely land.

[3] http://en.wikipedia.org/wiki/Qantas_Flight_72


I've been (perhaps foolishly) trying to work out what the actual attack here is.

I have strong suspicions... I saw a fascinating presentation a couple of years back* by the guy who built this: http://maps.spench.net/aviation/ (requires the Google Earth browser plugin). He's using the Universal SDR (software defined radio) to listen to various bits of telemetry coming down from commercial airliners (including, amusingly, automated reports from toilet failures!) and plotting in real time all the planes he's detecting data from. He's using ~$800 worth of radio hardware to recieve those transmissions, but you can listen in on those bands for a lot less using something like this: http://www.funcubedongle.com/ - and I've heard talk about re-purposed USB cableTV dongles being useable down in the ~$30 price range.

What the USDR can do that the cheaper receivers can't though, is _transmit_ on those bands. Hearing how readily Balint decoded the ModeS data, I'm 100% sure that a technically competent but not-very-sophisticated attacker could very easily transmit their own data on those channels using a USDR with the appropriate TX daughterboard (and, in the context of the original article, could easily control the USDR transmitter with an Android app).

(I do vaguely wonder whether any of the radio hardware in a typical Android device is "universal" enough to be convinced to transmit on the bands required here - I'm not quite enough of a radio-geek to know and/or go looking right now. I _strongly_ suspect not, and that if the original article has kernels of truth in it, it's referring to external transmitters controlled by an Android app)

* http://spench.net/drupal/video/mode-s-dorkbot


I'm not going to comment on the first part since all of that data is readily available, in real-time, on various Internet sites already. No need for a radio.

As to the question about the radios in cell phones the answer is yes and no. Yes a lot of modern baseband are nothing more than an SDR, but that's only part if the issue. The other issue is getting appropriate signal levels into and out of that device. For that you need specific filters and antennas for the frequencies you want to receive and transmit. For example, an LTE baseband can work on any of the LTE frequencies (and then some) but specific handsets will have filters for the appropriate region the handset is sold in. While you can change these it's just easier and cheaper to use something like a USRP.

If your interested in radio at all I suggest you start liking into ameture radio. There's still a ton of interning tinkering with everything from Morse code to data communications from 3MHz all the way into the hundreds of GHz frequencies.


"The described technique cannot engage or control the aircraft's autopilot system using the FMS or prevent a pilot from overriding the autopilot," the FAA's statement explained. "Therefore, a hacker cannot obtain 'full control of an aircraft' as the technology consultant has claimed."

That may be true, but this does not not seem to address the other claim that an attacker could inject false information into the FMS or cause it in some way to give misleading information to the flight deck, which could be nearly as bad.


So, apparently the full thing going on here is that if you have some other way to basically get root on one of the plane's systems (required in advance, not provided by this "exploit"), then you can cause a message to be displayed telling the pilot he's flying too close to some other aircraft.

The pilot will probably maneuver a bit to make room, and then will A) tell ATC about this, get a "what other aircraft" response, and B) look out the window, see there isn't another aircraft, and C) decide something's buggy with the system that's displaying the message.

Before this all went public, it would have been followed with D) maintenance crew looks into it after the plane lands.

Now that it's public, it will be followed with D) the plane lands ASAP and everyone on board has a nice chat with guys who have uniforms, guns and absolutely no sense of humor.


Perhaps that was the aim of this exercise?


This guy has all the right pieces, but sadly nobody is going to believe him until he demonstrates it on a functional plane.

I saw this talk at Blackhat on vulnerabilities in ADS-B, which scared the shit out of me. The paper is a good read http://media.blackhat.com/bh-us-12/Briefings/Costin/BH_US_12...

tl;dr: once a second every commercial plane transmits its location, heading, and speed over an unencrypted unauthenticated protocol, and other planes and air traffic control take it for truth.


Automatic Identification System (AIS)[1] is used for tracking ships and is also unprotected/unencrypted. This is not particularly an issue because ships inform government port and coastguard authorities of their source and destination ports long before entering sovereign waters. Those authorities can then use a system not too dissimilar to [2] to verify that a ship detected with radar:

a) is transmitting an AIS identifier that matches the paperwork already received

b) has been transmitting AIS track data that aligns with the paperwork already received since leaving the source port

Furthermore, ships have to allow a pilot on their vessel for pilotage into a port berth. Once they have pulled aside, the area surrounding the berth is, at least for most developed countries, a maritime security zone with barbed wire fences, security patrols and surveillance cameras.

The aviation sector has all of the above controls in place with even greater rigour. Encryption of track data, when factoring in the complexity of key exchange mechanisms and the expense of swapping out old hardware, would therefore have limited effect on either maritime or aviation security.

[1] https://en.wikipedia.org/wiki/Automatic_Identification_Syste...

[2] http://www.marinetraffic.com/ais/


"nobody is going to believe him until he demonstrates it on a functional plane."

And there are some _really_ obvious reasons why you wouldn't just go and do that so you can present the results at a conference. If the claims _are_ true, you'll need to get someone with the authority to grant you the privilege to demonstrate your attack against their aircraft - and so far as I can see, the most likely way to get to do that is probably to present a plausible and perhaps overblown paper at a well publicised conference.


The lack of security in ADS-B is bad, but how much of a problem could you really cause with it? The best I can come up with is tripping some collision alarms. Even then, you won't be able to do too much before pilots and controllers in the area decide that ADS-B is messed up and ignore it in preference to radar.


Serious question: what do you think about the lack of security in Mode A/C then?


Those are far less spoofable because so much of the information comes in the form of un-spoofable things like echo delays and directional information.

You could spoof Mode C altitude, of course. You could spoof a distance from the radar that's more than what your actual distance is by delaying your response to the interrogation. But that's about it. You can't spoof direction, and you can't pretend to be closer than you really are. I'm sure you could still make a minor nuisance of yourself, but it's not going to be a very big deal, I'd think.

I think you'd have to either be very close to the radar or airborne to pull any of this off, too, which means that you likely get to play games only once, then the large men in black suits will come ask you to please stop.


They may even omit the 'please'.


There are many people that do the same thing using APRS. Once you start digging it's pretty easy to get real-time location information for a ton of entities.

https://en.wikipedia.org/wiki/Automatic_Packet_Reporting_Sys...


When dealing with Technology, the very moment you irrevocably rebuke something as an impossibility is the very moment it becomes possible.

The simple fact that no one has been able to accomplish it yet should not mean in the slightest 'No, you can\'t'.


Whatever data finds its way into the FMS, and regardless of where it's coming from, it still needs to make sense to the crew. If it doesn't, we're not going to allow the plane, or ourselves, to follow it.

The dude solved the halting problem? I really don't trust in people that think they control complex computers running turbofan engines through sticks and displays.


If it's possible to trick the FMS as it seems they are not denying. Then in bad weather the pilot could easily be given false information to say that he's flying straight and level when he's actually in a dive or inverted. If you depend on your instruments and they are giving you bad data then in the right conditions it could certainly cause a crash. There have been planes that have gone down over the ocean because they could not tell the difference between the water and the sky and they did not trust their instruments and are in an inverted dive when they think they are climbing. Imagine if their instruments said they we're climbing and they thought they we climbing but were really in an inverted dive!


The FMS does not override those types of sensors. It is more about signaling the path of other aircraft. Broadcast a false danger and a pilot/autopilot will alter the course.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: