The FAA and EASA are “…working on fixing the issue”? Hard to think that there is only a singular “issue” here.
Jes Sorensen April 11, 2013 06:53
They are probably working on fixing it just like they ‘fixed’ the 787 batteries …..
Cristian Gafton April 11, 2013 07:27
They’ll fix the issue in a generic fashion by making it illegal to exploit any of the real issues. That’ll teach’em.
Eugene Crosser April 11, 2013 08:04
The story is fascinating, but there are signs of disinformation or mislead. First of all, the attacker would need a transmitter working on the frequencies of ADS-B and ACARS. Not that it has to be difficult, SDR boards are compact and inexpensive, if we are to believe bloggers, but the article makes it seem as if simply an app running on an Android phone is sufficient.
Michael K Johnson April 11, 2013 09:29
I’m guessing that “the issue” is the code injection attack against the ACARS system he was attacking. AFAIK, ACARS is on the normal aviation communications frequencies, and so transceivers are cheap and widely accessible for legitimate reasons; no need for SDR.
Just sending bogus ACARS data is conceptually similar to impersonating ATC (as happens from time to time); the pilot’s common sense would be an available defense. Code injection into these practically unprotected networks on the planes is what adds immediate danger.
Imported from Google+ — content and formatting may not be reliable