AAtS - Information Exchange Vulnerability

advertisement
Federal Aviation
Administration
AAtS Information
Exchange Vulnerability
Assessment
Threat-Scenario-Based
Hazard Analysis and Risk Assessment
Presenter:
Date:
Robert Klein
August 27, 2014
Data Exchange Comparison Reference
Data Exchange Reference Model
AIXM
DATA Format
Information Product
Cal / Val
Data & Information Description
Authentication
Primary Source
FIXM
NAS Standard Templates
Individual Flight Objects
NAS Standard Weather
Geospatially Corrected with
Geospatially Corrected with
Geospatially Corrected with
Occasional Updates
Dynamical Updates
Dynamical Updates
Operator – to NESG (pub.)
FAA - to NESG (pub.)
FAA
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
WXXM
Airport / Surface Templates
OCS, ICA, etc.
Flow Constrained Area
Standard Terminal Arrival Route (STAR)
Standard Instrument Departure (SID)
RNP Approaches, J-Routes,
Q-Routes, etc.
Temporary Flight Restriction (TFR)
Special Use Airspace (SUA)
eNOTAMs
Traffic Management Initiatives (TMIs)
Air Traffic / Traffic Flow Management
1.
2.
3.
4.
5.
6.
7.
Flight Plan(s)
Approved RNAV Routing
RTAs
Flight History
Flight Object
Trajectory Option Set (TOS)
FF-ICE (Flight & Flow Information for a
Collaborative Environment
FAA
Operators
2
Operator - to NESG (pub.)
FAA - to NESG (pub.)
1.
2.
3.
4.
5.
6.
7.
METARs
SIGMETs and Convective SIGMETs
TAFs
Winds and Temps Aloft
AIRMETs
Real-time Surface Winds / Wind Field
Profiles
PIREPs
NWS, FAA, and Operators
Federal Aviation
Administration
So what-? Why do we care?
Because . . .
∑(AIXM,FIXM,WXXM)∫(AAtS*AC*AOC*ATC)=
Collaborative Decision Making (CDM)
CDM = Operational Efficiency (η)
And . . .
3
Federal Aviation
Administration
The Concern . . .
4
Federal Aviation
Administration
Meanwhile, in 12-A . . .
5
Federal Aviation
Administration
Airborne WiFi in the News
August 4, 2014, 12:56 PM ET
In-flight Wireless Systems Vulnerable, Security Researcher Says
By CLINT BOULTON
A cybersecurity researcher says he has figured out how to hack the satellite communications equipment on passenger jets
through their Wi-Fi and in-flight entertainment systems.
Cybersecurity researcher Ruben Santamarta, a researcher with cybersecurity firm IOActive, will present the technical details of his
research Thursday at this week’s Black Hat hacking conference in Las Vegas, Reuters reports.
Since its inception in 1997, Black Hat has been the staging ground where hackers and cybersecurity experts convene to discuss their research,
including emerging cyberthreats. In previous years at Black Hat, researchers have demonstrated how to hack anything from ATM systems,
to insulin pumps and pacemakers.
Mr. Santamarta will show how a hacker can use a plane’s in-flight Wi-Fi and entertainment system to hack into its avionics equipment,
potentially disrupting satellite communications, which could interfere with the aircraft’s navigation and safety systems. “These devices are wide
open,” Mr. Santamarta, who stumbled upon the vulnerabilities by “reverse engineering” firmware used in communications equipment, told
Reuters. “The goal of this talk is to help change that situation.”
Airlines may take some comfort in the fact that Mr. Santamarta said that his hacks have only been tested in controlled environments, and they
might be difficult to replicate in the real world.
Black Hat is also prone to cancellations, and thus far there have been three for this year’s event.
Security researchers this week pulled two scheduled talks — one on breaking into home-alarm systems and the other on a sophisticated Russian
espionage campaign known as “Snake.” The withdrawals follow the cancellation last month of a talk on how to identify users of Tor, the Internet
privacy service.
6
Federal Aviation
Administration
‘Original Article’
Hacker says to show passenger jets at risk of cyber attack
BY JIM FINKLE
BOSTON Mon Aug 4, 2014 8:09am EDT
(Reuters) - Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on
passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.
Santamarta, a consultant with cyber security firm IOActive, is scheduled to lay out the technical details of his research at this week's Black Hat
hacking conference in Las Vegas, an annual convention where thousands of hackers and security experts meet to discuss emerging cyber
threats and improve security measures.
7
Federal Aviation
Administration
AAtS Threat Portals
Elevation of
privilege
Spoofing
identity
Denial of
service
Tampering
with data
Information
disclosure
Repudiation
8
Federal Aviation
Administration
Threat Categories & Descriptions
Threat
Number
Category
TS-1
D
TS-2
E, D
Cabin gaining unauthorized access to DLS
TS-3
E, T
Cabin user gains unauthorized access to Wireless Access Point
TS-4
D
TS-5
S, I, D
Unauthorized Network Mapping by Authenticated User
TS-6
S, E, D
External Attacks with IP Address or Hostname
TS-7
D
TS-8
S, E, I
TS-9
S, D
TS-10
I
TS-11
S, T, I, E
Description
Improper traffic originating from the EFB
Consumption of DLS Bandwidth
Wireless Access Point/Router DoS
Rogue access point impersonating Wireless Access Point
EFB may make excessive queries, conducting a DoS
User in the cabin sniffing flight deck traffic
Attack on the Certificate Authority and Rogue Certificates
9
Federal Aviation
Administration
FAA Risk Assessment Matrix
Safety Risk
Assessment Matrix
from FAA ORDER
8040.4A
10
Federal Aviation
Administration
Threat Scenario Risk Assessment
Assessed Risk
Number
of
Threats
Unacceptable risk
0
Acceptable Risk with
Mitigations
5
Acceptable risk
6
11
Federal Aviation
Administration
Conclusions
• The ERAU report presents several
interesting network security threat
scenarios.
• There may be others . . .
• Threat Scenarios 1 thru 11 do not represent
either Hazardous or Catastrophic risk
severity from an operational perspective.
• We are continuing to evaluate this important
issue.
12
Federal Aviation
Administration
Download