GDL90fuzz: Fuzzing-GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective

被引:5
作者
Turtiainen, Hannu [1 ]
Costin, Andrei [1 ]
Khandker, Syed [1 ]
Hamalainen, Timo [1 ]
机构
[1] Univ Jyvaskyla, Fac Informat Technol, FI-40014 Jyvaskyla, Finland
基金
欧盟地平线“2020”;
关键词
Fuzzing; Aerospace electronics; Protocols; Software; Heart beat; Aircraft; Standards; GDL-90; ADS-B; attacks; cybersecurity; pentesting; resiliency; DoS; aviation; avionics;
D O I
10.1109/ACCESS.2022.3150840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the core technology of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular. However, many (if not most) ADS-B devices and implementations support and rely on Garmin's Datalink 90 (GDL-90) protocol for data exchange and encapsulation. This makes it essential to investigate the integrity of the GDL-90 protocol especially against attacks on the core subsystem availability, such as denial-of-service (DoS), which pose high risks to safety-critical and mission-critical systems such as in avionics and aerospace. In this paper, we consider GDL-90 protocol fuzzing options and demonstrate practical DoS attacks on popular electronic flight bag (EFB) software operating on mobile devices. Then we present our own specially configured avionics pentesting platform and the GDL-90 protocol. We captured legitimate traffic from ADS-B avionics devices. We ran our samples through the state-of-the-art fuzzing platform American Fuzzy Lop (AFL) and fed the AFL's output to EFB apps and the GDL-90 decoding software via the network in the same manner as legitimate GDL-90 traffic would be sent from ADS-B and other avionics devices. The results showed worrying and critical lack of security in many EFB applications where the security is directly related to the aircraft's safe navigation. Out of the 16 tested configurations, our avionics pentesting platform managed to crash or otherwise impact 9 (56%). The observed problems manifested as crashes, hangs, and abnormal behaviors of the EFB apps and GDL-90 decoders during the fuzzing test. Our developed and proposed systematic pentesting methodology for avionics devices, protocols, and software can be used to discover and report vulnerabilities as early as possible.
引用
收藏
页码:21554 / 21562
页数:9
相关论文
共 52 条
[1]  
A. S. Foundation, APACHE LICENSE VERSI
[2]  
Alias Robotics, CYBERSECURITY STATUS
[3]  
[Anonymous], 2014, RTCA DO 267 MINIMUM
[4]  
[Anonymous], 2007, GDL 90 DATA INTERFAC
[5]  
[Anonymous], 2021, MAVLINK DEV GUID
[6]  
Auterion, 2019, GITHUB MAVLINK FUZZ
[7]  
Bendix/King, 2021, KAP 140 AUT SYST
[8]   PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary [J].
Chen, Yaohui ;
Mu, Dongliang ;
Xu, Jun ;
Sun, Zhichuang ;
Shen, Wenbo ;
Xing, Xinyu ;
Lu, Long ;
Mao, Bing .
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, :633-645
[9]   How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles [J].
Contag, Moritz ;
Li, Guo ;
Pawlowski, Andre ;
Domke, Felix ;
Levchenko, Kirill ;
Holz, Thorsten ;
Savage, Stefan .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :231-250
[10]  
Costin A., 2012, Proceedings of Black Hat USA, P1