16
[email protected] Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts Marko Wolf, ESCRYPT GmbH – Embedded Security AVIONICS Europe 2012, 22.03.2012, Munich, Germany

Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts

Marko Wolf, ESCRYPT GmbH – Embedded Security

AVIONICS Europe 2012, 22.03.2012, Munich, Germany

Page 2: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

The Stuxnet Incident (2010)

Large scale sabotage of nuclear facilities in Iran by

malicious manipulation*) of centrifuges control software

US/Israel intelligence services as suspected attacker

Sophisticated attack via PLC programming device, which

is regularly connected to Internet-enabled, even

Windows®-operated and very vulnerable desktop PCs

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 2

PLC system Program device Desktop PC Vulnerability, USB.. LAN, USB..

Images (some): http://commons.wikimedia.org. *) N. Falliere et al.: W32.Stuxnet Dossier. Symantec Corp Whitepaper, 2011.

Connecting weakly protected Internet-

enabled devices to unsecured IT systems

Page 3: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

The Stuxnet Incident (2010)

Stuxnet incident alarmingly demonstrated at least that:

1. Cyberwar is no science-fiction anymore. Concerted IT

security attacks are real – they are already strong

political, economical, and even military weapons.

2. Ongoing computerization and increasing digital

interconnections make most of today’s IT systems

susceptible to attacks, also systems which were

thought to be immune against serious security

threats such as industry automation, medical devices,

cars …

... and modern computerized aircrafts?

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 3

Page 4: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Intercepting U.S. Predator drone’s live video feeds (2009)

US drones remotely operated using bidirectional comm.

2009*) – US military personnel in Iraq discovered copies

of Predator drone video feeds on a Iraqi militant’s laptop

Intercepted communication links with commercially

available software (“SkyGrabber”) and cheap off-the-shelf

equipment

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 4

Enemies could use the data/video

“kindly provided” by the drone to

monitor and evade military actions

Unprotected, this

means, no confidentiality for

outgoing communication links

*) The Wall Street Journal: Insurgents Hack U.S. Drones. December, 2009. Image: http://commons.wikimedia.org/wiki/File:081131-F-7734Q-001.jpg.

Page 5: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Spoofing U.S. RQ-170 Sentinel drone’s GPS navigation (2011)

US drones act automatically on certain comm. inputs

2011 – US Sentinel drone “logically downed” by Iran w/o damage and failing automatic return or self-destruction

Presumably1) (US: “spectacular malfunction” vs. Iran: “electronic warfare”) by spoofing drone's GPS navigation system causing it to land automatically

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 5

Enemies could acquire secret

technology and embarrass US

No matter what happened exactly,

GPS spoofing is exemplary, but

realistic 2)

for unauthenticated ingoing

communication links

Images: Iran´s Revolutionary Guard Websi Handout (top), Humphreys et al. (bottom). 1) D. Majumdar : Iran’s captured RQ-170: How bad is the damage? AirforceTimes, 12/2011.

2) Humphreys et al.: Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. ION GNSS, 2008.

Page 6: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Spoofing phantom aircrafts w/ faked ADS-B message beacons

Broadcasted with 1 Hz on 1090 MHz

to make aircrafts visible in real-time

for nearby aircrafts, ground control,

air traffic control, collision avoidance…

ADS-B used by most commercial

aircrafts and foreseen to replace radar

ADS-B specs

have no authenticity or integrity

protection against manipulations or

spoofing2)

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 6

ADS-B1) digital aircraft beacons containing the aircraft’s

unique identity, position, speed, heading and other data

Image: http://en.wikipedia.org/wiki/File:Adsbhome2.jpg. 1) Automatic Dependent Surveillance-Broadcast.

2) K. Sampigethaya et al.: Secure Operation, Control and Maintenance of Future eEnabled Airplanes. IEEE Special issue on Aviation Information Systems, 2008.

Page 7: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Spoofing phantom aircrafts w/ faked ADS-B message beacons

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 7

Misuse freely available,

portable ADS-B transponder Spoofed phantom

aircraft

Interference of phantom

aircraft, for instance, w/

TCAS collision avoidance

Images: http://commons.wikimedia.org/wiki/File:NAV_Geräte_im_Cockpit_einer_C172_1212_VOR_Transponder_ADF.JPG,Airzena_Boeing_737-500_Nikiforov.jpg,Tcas_EU-Flysafe.jpg

*) J. Epik. Phantom Controller. Beach Mountain Press, 2012. In 1993 one was impersonating an air traffic controller while spoofing bogus ATC messages to pilots via analogue radio for 6 weeks.

Just imagine, a new, digital “Roanoake Phantom”*)…

Page 8: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Potentially vulnerable on-board networks connected with IFE

In-flight entertainment systems (IFE) are insecure1) legacy systems

With Boeing 787 and others, Internet-enabled IFE systems have “somehow” 2) become connected to critical aircraft domains, which are neither designed nor FAA regulated to thwart any security threats

Mission-critical systems are potentially susceptible to security attacks via IFE3)

Potential 3) Risk for unauthorized access due to insufficient separation of aircraft on-board IT domains

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 8

1) H. Thompson. How to crash an in-flight entertainment system. blogs.csoonline.com, 2009. 2) K. Zetter. FAA Responds to Boeing Security Story. wired.com, 2008.

3) FAA Special Conditions No. 25-356-SC: Boeing Model 787-8 Airplane. Systems and Data Networks Security – Isolation or Protection From Unauthorized Passenger Domain Systems Access.

Images: commons.wikimedia.org/wiki/File:Flight_entertainment_system_uses_Linux.jpg.

Page 9: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Integrating COTS-based Electronic Flight Bags

Electronic flight bags (EFB) for flight crew cockpit data management

tasks (e.g., manuals, dynamic maps, live weather, takeoff or flight

calculations, night vision [military]) digitally connected to airplane

onboard data network and airport infrastructure (for content updates)

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 9

Images: Own sketch of an actual navAero EFB connection system. More details cf. www.navaero.com/?page=products&subpage=tablet.

(Cockpit) http://commons.wikimedia.org/wiki/File:C130_cockpit.jpg.

For class 1 & 2 realized by WiFi and

Internet-enabled COTS devices (e.g.,

iPads, Android or XP tablets) with

known vulnerable legacy operating

systems (e.g., Microsoft Windows)

Current EFB approvals (e.g., TGL 36

JAA EFB) consider mainly (IT) safety

(e.g., battery) but merely IT security

Potential

from EFB denial of service attacks up

to malicious onboard encroachments

Page 10: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Modern Computerized Aircrafts

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 10

Several dozens digitally interconnected, complex IT systems, being highly

integrated, sharing HW resources/periphery/interfaces, & running GBs of SW

Various (wireless) interfaces, there some are connected to Internet-enabled

devices (e.g., EFB) for data exchange (airport, airline), diagnosis, maintenance..

Built up from million components from sub-sub-suppliers from all over the

world, which makes it impossible to track complete supply chain

Standardized, homogeneous modular architecture approach, and hence

Increasing deployment of off-the-shelf hardware and software components Cf. M. Olive et al.: AEEC Communications Security Activities. International CNS Conference, 2007.

Page 11: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Aircraft Comm. Security Threats

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 11

Enforcement of confidentiality and authenticity for military aircraft-

to-X communication is still difficult and rare*)

Civil aircraft comm. generally in clear using open, shared links w/o

measures to verify the integrity of the communication, authenticity

of the comm. endpoints, or to enforce access control to comm. link *) J. Keller: Military crypto modernization leads to applications like smartphones, tablet computers on the battlefield. Military & Aerospace Electronics, 11/2011.

Page 12: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Further Aircraft Security Threats I

“The future of digital systems is complexity, and

complexity is the worst enemy of security.” (B.Schneier)

since complex systems:

– have more lines of code more security bugs

– have more interactions more security bugs

– are harder to test more likely to have untested portions

– are harder to design, implement, configure, and use securely

Increasing sharing of resources and interfaces together

with inter-domain connections (i) create new attack

paths and (ii) multiply security vulnerabilities through

complexity

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 12

Page 13: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Further Aircraft Security Threats II

Counterfeits from “dubious” sources1) or even malicious

“Trojan” hardware2) or software components that may

already include malware

Standardized, homogeneous IMA*) architectures and

increasing deployment of COTS*) hardware & software

increases “coverage” and power of attacks and malware

Aircraft components undergo a strong safety evaluation,

but they are usually not evaluated regarding their IT

security properties, since there are no or only little,

very slow evolving regulations regarding IT security3)

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 13

1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design & Test of Computers (27), 2010.

3) Cf. DO-178B from 1993!, ARINC 666, ARINC 823, ARINC 653, or ARINC 811. *) Integrated Modular Avionics (IMA), Commercially available Off-The-Shelf (COTS).

Page 14: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Potential Aircraft Attackers

Potential attackers could be: – Enemy Cyberwar units to repel, interfere, mislead, or destroy a

particular aircraft (cf. drone incidents)

– Adversarial intelligence services for sabotage (cf. Stuxnet incident) or for political/economical related espionage

– Terrorist (groups) to sabotage a particular aircraft or aircraft control system for political motivated extortion or intimidation

– Business competitors for industrial espionage or even limited sabotage to attack others costs or reputation

– Autonomous, unidentified hackers or hacking groups for fun, fame, politics, revenge, or profit

Attack potential can be high based on: – Financial resources

– Attack expertise

– Target knowledge

– Technical equipment

– Access perimeters

– Time frame

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 14

?

Page 15: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Quick Summary

Cyber attacks already have reached avionics domain.

Presented four of rare publicly known military and civil

security examples, but assume much higher dark figure.

Potential attackers range from “hacking passenger” up to

million dollar, multiple expert electronic warfare units.

Aircraft security threats from increasing: computerization,

homogenization, integration, complexity, resources

sharing, inter-domain and wireless connections …

In contrast to IT safety, aircraft IT security has only very

recently started to emerge, but effective & efficient

protection mechanisms already exist (cf. automotive).

For first practical recommendations, please have a look

at our article or visit next year’s ESCRYPT presentation ;)

22.03.2012 Marko Wolf – Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts 15

Page 16: Aircraft IT Security - Marko Wolf · 1) C.E. Schumer: Counterfeiting of Military Technology, Press Release, July, 2011. 2) M. Tehranipoor et al.: A Survey of Hardware Trojan Taxonomy

[email protected]

Marko Wolf Senior Security Engineer

ESCRYPT Munich, Germany [email protected]