460 likes | 733 Views
CW/EW Attacks against UAV Systems. Media Induced Hysteria or Sobering Reality? Sachin Deodhar Threatlabz Security Research Group. Introduction to “ myself ”. Here is where I blow my own horn ;-) Sachin Deodhar (Cyber Security Researcher, APT and CPS)
E N D
CW/EW Attacks against UAV Systems Media Induced Hysteria or Sobering Reality? SachinDeodhar Threatlabz Security Research Group
Introduction to “myself” • Here is where I blow my own horn ;-) • Sachin Deodhar (Cyber Security Researcher, APT and CPS) • Threatabz Security Research Group (Zscaler Inc.) • Work with Defense, IC, CT and Government sector
Unmanned Aerial Vehicles • An aircraft with no pilot on board • Flight is controlled either by computers in the vehicle (autonomous), or under the remote control of a pilot on the ground or in another vehicle (remotely piloted). • A taxonomy is necessary to provide a consistent and unambiguous way to talk about UAVs • Different ways to think about UAVs – different types, different missions, different payloads, different levels of endurance, different degrees of autonomy • Not all UAVs are “armed” and not all UAVs are used in the military
Types of UAVs - Missions • Intelligence, Reconnaissance • Surveillance • Armed Missions • Communications • Extraction/Insertion
Mission Types • Intelligence/Reconnaissance - providing battlefield intelligence • Mapping – preparing maps, charts, analyzing aerial photographs • BDA – battlefield damage assessment • Target Acquisition/Designation – static, dynamic, hostile/benign • Surveillance • Geospatial – static (non-moving target), dynamic (moving target) • Listening – signals intelligence • NBC Sensing – detecting signs/indicators of nuclear, biological and chemical (warfare) attacks
Mission Type (Contd.) • Communications – mobile ad-hoc networks (wireless) using UAV • Comm. Relays/Ad Hoc Battlefield Networks • Extraction/Insertion • EW – Electronic Attack (EA), Electronic Protection (EP) • Payload Delivery – Lethal, Non-Lethal • Armed Missions • Decoys – providing ground and aerial gunnery a target that simulates an enemy aircraft or missile • Targeted (Armed) Missions - providing attack capability for high-risk missions
Types of UAVs - Autonomy • Autonomy - ability to make decisions without human intervention. To that end, the goal of autonomy is to teach machines to be "smart" and act more like humans • The ultimate goal in the development of autonomy in UAV technology is to replace the human pilot • Degrees of Autonomy – ranges from remotely piloted aerial vehicles to fully autonomous (fire and forget style) UAV systems • Gradual evolution towards “full vehicle autonomy” - reduce the dependence of a UAV on the Ground Control infrastructure making it a self-contained and autonomous
Autonomy – Requirements • Sensor fusion – combine information from various sensors on a “single window” • Motion (Path) Planning and Trajectory Generation – generate optimal path and execute optimal control maneuvers and/or faithfully cohere to the path defined • Distributed Communications - Handling communication and coordination between multiple agents in the presence of incomplete and imperfect information
UAV Types - Endurance • UAVs are not burdened with the physiological limitations of human pilots, they can be designed for maximized on-station times • IC Engines (low endurance) • Solar Powered (medium endurance) • Electric UAVs (very high endurance – uses laser beaming technology) • Primary objective of high endurance UAVs – “stare" at the battlefield for a long period of time to produce a record of events that could then be played backwards (e.g. to track where improvised explosive devices (IEDs) came from) • E.g. VULTURE - Very-high altitude, Ultra-endurance, Loitering Theater Unmanned Reconnaissance Element
Attacks against UAV platforms • Growing incidences of cyber/electronic attacks against UAVs in recent years • Attack vectors and techniques are dependent on type of UAV and its system/functional characteristics • Attack vectors are typically more potent and effective when targeting civilian use (non-military) UAVs • Attacks target either • on-board avionics systems and software • Communication data-links between ground based stations and UAVs • Support systems (e.g. GPS) that UAVs rely upon for navigation and control
RQ-170 Stealth Sentinel • RQ-170 (Stealth Sentinel) measures 27.43m wide and 1.82m high. • It is a high altitude and long endurance unmanned aerial vehicle (UAV) designed and manufactured by Skunk Works, a division of Lockheed Martin Corporation, for the United States Air Force (USAF) • The aerial vehicle was designed to execute intelligence, surveillance, reconnaissance and target acquisition (ISTAR) and electronic warfare missions over a target area.
RQ-170 Drone Specifications • RQ-170 UAV can capture real time imagery of the battlefield and transfer the data to the ground control station (GCS) through a line of sight (LOS) communication data link • Flies at an altitude of approx. 50,000ft • Lost-link profile – RQ-170 must autonomously follow a pre-programmed “lost-link” profile consisting of waypoints at various altitudes, forming a loop until it re-establishes contact or crashes • Controlled either manually from the GCS or through autonomous mode • An automatic launch and recovery (ALR) system facilitates the aircraft to land safely when communication with the control station fails
RQ-170 Drone GCS • GCS of the RQ-170 displays the real time imagery or videos captured by the vehicle's payload cameras onboard • GCS tracks, controls and monitors the RQ-170 by transferring commands to the vehicle via LOS SATCOM data link • Operated by the 432nd wing of air combat command (ACC) at Creech Air Force Base, Nevada, and 30th reconnaissance squadron at Tonopah Test Range, Nevada.
RQ-170 Drone Capture - Details • On 4 December 2011, an American Lockheed Martin RQ-170 Sentinel unmanned aerial vehicle (UAV) was captured by Iranian forces near the city of Kashmar in northeastern Iran • Iran claims that the “UAV was brought down by its cyberwarfare unit which commandeered the aircraft and safely landed it” • The attack comprised of jamming both satellite and land-originated control signals to the UAV, followed up by a GPS spoofing attack that fed the UAV false GPS data to make it land in Iran at what the drone thought was its home base in Afghanistan • It is speculated that the UAV navigation & guidance could be targeted by 1L222 Avtobaza ELINT (radar jamming and deception system) supplied to Iran by Russia
Iranian Engineer – how the RQ-170 was forced to land • Original Persian Transcript - با قرار دادن سر و صدا [پارازیت] در ارتباطات، شما را مجبور پرنده به خلبان اتوماتیک. این جایی است که پرنده مغز خود را از دست می دهد • EN Translation - "By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain.” • “The “spoofing” took into account precise landing altitudes, as well as latitudinal and longitudinal data – made the drone “land on its own where we wanted it to, without having to crack the remote-control signals and communications” from the US control center”
RQ-170 Drone Capture - Summary • Does not constitute a conventional “cyber attack” but falls in the realm of “electronic warfare attacks” • Compromised the UAV’s navigation and guidance system • Primary attack vector – GPS jamming • Secondary attack vector – GPS spoofing • Cat and Mouse – US claims that the primary navigation/guidance system used by the RQ-170 is NOT GPS based but is an “inertial navigation” system; but confirmed that Iran was in possession of the RQ-170 drone after previously denying Iranian claims
Replicating the RQ-170 attack • Assumptions & Constraints • Attack will target a civilian drone • Limited resources • Limited budget • Attack focused on civilian GPS signals (L1) • Civilian GPS spoofer (Ref: work on civilian GPS spoofer by the Radionavigation Laboratory at the UoT – Austin) • Multi-stage attack closely shadows the Iran incident – jam signal correlation spoof hijack
Countermeasures Increasing sophistication (top to bottom) • Data bit latency defense (basic defense against simple spoofing attacks) • Vestigial signal defense • Multi-antenna defense (defense against intermediate level spoofing attacks) • Assimilative defense (makes existing GPS equipment resistant to jamming and spoofing without requiring hardware or software changes to the equipment) • Cryptographic defense based on estimation of W-bits (embedding cryptographic signatures in the spreading codes that will defeat a sophisticated spoofing attack)
Implications • Not all UAVs are armed drones (not all drones “kill”) • Not all attacks are “cyber” • Lone wolf is an unlikely scenario at least in the near future • Nation states are more likely to have the necessary technical capabilities and know-how to launch attacks • Attacks against civilian-use UAVs are a greater concern • Civilian use hardware/software, communication protocols are less likely to be subject to same level of scrutiny and testing, and inherently insecure in many instances
Cyber attacks against UAVs – future possibilities • Current research – software avionics vulnerabilities, and compromise of communication data links (data link 16) • Flaws in ADS-B, ACAIRS and other protocols used in civil aviation systems could be potentially used to compromise UAVs that rely on similar or same communication protocols • UAVs in civilian airspace for civilian applications – increasing use and insecure software, communication protocols • Next talk(s) will illustrate these flaws and their potential to be exploited