<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: How A Hacker Could Hijack A Plane From Their Seat &#124; IFLScience</title>
	<atom:link href="http://www.epanorama.net/blog/2015/05/21/how-a-hacker-could-hijack-a-plane-from-their-seat-iflscience/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/05/21/how-a-hacker-could-hijack-a-plane-from-their-seat-iflscience/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 25 Apr 2026 00:22:14 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/05/21/how-a-hacker-could-hijack-a-plane-from-their-seat-iflscience/comment-page-1/#comment-1639518</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 May 2019 13:57:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=32043#comment-1639518</guid>
		<description><![CDATA[https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/]]></description>
		<content:encoded><![CDATA[<p><a href="https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/" rel="nofollow">https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/05/21/how-a-hacker-could-hijack-a-plane-from-their-seat-iflscience/comment-page-1/#comment-1639517</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 May 2019 13:57:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=32043#comment-1639517</guid>
		<description><![CDATA[Hakkerit häiritsivät lentokoneen kriittisiä laskeutumis- ja törmäyksenestojärjestelmiä
https://www.tivi.fi/uutiset/tv/3d2ca0f4-f266-45c7-92ad-459f2e8699f6

Tietoturvaongelmat ovat vakava asia, varsinkin silloin, kun ne vaarantavat ihmishenkiä.]]></description>
		<content:encoded><![CDATA[<p>Hakkerit häiritsivät lentokoneen kriittisiä laskeutumis- ja törmäyksenestojärjestelmiä<br />
<a href="https://www.tivi.fi/uutiset/tv/3d2ca0f4-f266-45c7-92ad-459f2e8699f6" rel="nofollow">https://www.tivi.fi/uutiset/tv/3d2ca0f4-f266-45c7-92ad-459f2e8699f6</a></p>
<p>Tietoturvaongelmat ovat vakava asia, varsinkin silloin, kun ne vaarantavat ihmishenkiä.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/05/21/how-a-hacker-could-hijack-a-plane-from-their-seat-iflscience/comment-page-1/#comment-1639516</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 May 2019 13:57:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=32043#comment-1639516</guid>
		<description><![CDATA[Attackers can Hack Airplane Landing Instruments, According to Researchers
https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/

https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/

The problem, like the problem with PLCs in the industrial sector, is that these wireless communications are not secured. Crucial instruments like Traffic Alert and Collision Avoidance Systems(TCAS) and Instrument-Landing Systems(ILS) rely on wireless communication that affect the safety of a flight.

According to the researchers, in an overshadow attack, the attacker “transmits pre-crafted ILS signals of higher signal strength; thus overpowering the legitimate ILS signals.” And in a single tone attack, attackers only need to “transmit a single frequency tone signal at a specific signal strength (lower than the legitimate ILS signal strength) to interfere and control the deflections of the course deviation indicator needle.”

In the flight simulations the researchers performed, their planes landed as far as 800 meters beyond the safe landing zone.

Wireless Attacks on Aircraft Instrument Landing Systems
https://aanjhan.com/assets/ils_usenix2019.pdf

 Forinstance,  air  traffic  controllers  verbally  communicate  withthe pilots over the VHF (30 to 300 MHz) radio frequencychannels.  The airplanes continuously broadcast their posi-tion, velocity, callsigns, altitude,etc. using the automatic de-pendent surveillance-broadcast (ADS-B) wireless communi-cation protocol.  

many radio navigation aids such as GPS, VHF Omnidirec-tional  Radio  Range  (VOR),  Non-directional  radio  beacons(NDB), Distance Measuring Equipment (DME), and Instru-ment Landing System (ILS) play crucial roles during differ-ent phases of an airplane’s fligh

Many studies have already demonstrated that a number ofthe above-mentioned aviation systems are vulnerable to at-tacks.   For example,  researchers [21] injected non-existingaircraft  in  the  sky  by  merely  spoofing  ADS-B  messages.Some other attacks [36] modified the route of an airplane byjamming and replacing the ADS-B signals of specific vic-tim aircraft.  ACARS, the data link communications systembetween aircraft and ground stations was found to leak a sig-nificant  amount  of  private  data [49],  e.g.,  passenger  infor-mation, medical data and sometimes even credit card details

One of the most critical phases of an airplane’s flight planis the final approach or landing phase as the plane descendstowards the ground actively maneuvered by the pilot.

Several technologies and systems such as GPS, VOR, DMEassist the pilot in landing the aircraft safely. The InstrumentLanding System (ILS) [1] is today the de-facto approach sys-tem used by planes at a majority of the airports as it is themost precise system capable of providing accurate horizontaland vertical guidance.

Out of these405,822 flight plans, 95% were instrument flight rule (IFR)plans.  Instrument flight rules are a set of instructions estab-lished by the FAA to govern flight under conditions in whichflying by visual reference is either unsafe or just not allowed.Also,  several European airports [13] prohibit aircraft fromlanding using visual flight rules during the night. ILS incor-porates radio technology to provide all-weather guidance topilots which ensures safe travel and any interference can becatastrophic

As  recently  as  September  2018,  the  pilots  of  Air  Indiaflight AI-101 reported an instrument landing system (ILS)malfunction  and  were  forced  to  do  an  emergency  landing.Even worse,  TCAS, ACARS, and a majority of other sys-tems that aid a smooth landing were unusable.

In order to evaluate the complete attack, we develop atightly-controlled  closed-loop  ILS  spoofer.   It  adjuststhe the adversary’s transmitted signals as a function ofthe  aircraft  GPS  location,  maintaining  power  and  de-viation consistent with the adversary’s target position,causing an undetected off-runway landing. We demon-strate the integrated attack on an FAA certified flight-simulator  (X-Plane),  incorporating  a  spoofing  regiondetection mechanism, that triggers the controlled spoof-ing on entering the landing zone to reduce detectability.

The first fully operational ILS was deployed in 1932 at theBerlin Tempelhof Central Airport, Germany. 

 ITU defines ILS [56] as“a radio navigation system which provides aircraft with hor-izontal and vertical guidance just before and during landingand at certain fixed points, indicates the distance to the refer-ence point of landing”.  Autopilot systems on some modernaircraft  [48] use ILS signals to execute a fully autonomousapproach and landing,  especially in low visibility settings

ILS signals are generated and transmitted such that the wavesform a specific radio frequency signal pattern in space to cre-ate guidance information related to the horizontal and verti-cal positioning.  ILS signal generators leveragespace mod-ulation

Localizer.The localizer subsystem consists of an array ofmultiple antennas that emit the CSB and SBO signals suchthat the 150 Hz modulation predominates to the right of therunway centerline and the 90 Hz signal prevails to the left.

Each runway operates its lo-calizer at a specific carrier frequency (between 108.1 MHz to111.95 MHz) and the ILS receiver automatically tunes to thisfrequency 

runway identifieris transmitted using a 1020 Hz morse code 

The glideslope subsystem uses two antennas

  The mixing of the CSB and SBO signals re-sults in a pattern in which the 90 Hz component of the signalpredominates  in  the  region  above  the  glide-path  while  the150 Hz prevails below the glide-path.  The glideslope usescarrier  frequencies  between  329.15  MHz  and  335.0  MHz,

The combined signals received at the aircraft are amplified,demodulated, and filtered to recover the 90 Hz and 150 Hzcomponents. 

For example, an aircraft that is on-course will receive both90 and 150 Hz signals with the same amplitude

3    Wireless Attacks on ILSWe  demonstrate  two  types  of  wireless  attacks:   i)  Over-shadow  attack  and  ii)  Single-tone  attack.In  the  over-shadow attack, the attacker transmits pre-crafted ILS signalsof higher signal strength;  thus overpowering the legitimateILS signals. The single-tone attack is a special attack whereit is sufficient for the attacker to transmit a single frequencytone signal at a specific signal strength (lower than the legit-imate ILS signal strength) to interfere and control the deflec-tions of the course deviation indicator needle.]]></description>
		<content:encoded><![CDATA[<p>Attackers can Hack Airplane Landing Instruments, According to Researchers<br />
<a href="https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/" rel="nofollow">https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/</a></p>
<p><a href="https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/" rel="nofollow">https://codesmithdev.com/attackers-can-hack-airplane-landing-instruments-according-to-researchers/</a></p>
<p>The problem, like the problem with PLCs in the industrial sector, is that these wireless communications are not secured. Crucial instruments like Traffic Alert and Collision Avoidance Systems(TCAS) and Instrument-Landing Systems(ILS) rely on wireless communication that affect the safety of a flight.</p>
<p>According to the researchers, in an overshadow attack, the attacker “transmits pre-crafted ILS signals of higher signal strength; thus overpowering the legitimate ILS signals.” And in a single tone attack, attackers only need to “transmit a single frequency tone signal at a specific signal strength (lower than the legitimate ILS signal strength) to interfere and control the deflections of the course deviation indicator needle.”</p>
<p>In the flight simulations the researchers performed, their planes landed as far as 800 meters beyond the safe landing zone.</p>
<p>Wireless Attacks on Aircraft Instrument Landing Systems<br />
<a href="https://aanjhan.com/assets/ils_usenix2019.pdf" rel="nofollow">https://aanjhan.com/assets/ils_usenix2019.pdf</a></p>
<p> Forinstance,  air  traffic  controllers  verbally  communicate  withthe pilots over the VHF (30 to 300 MHz) radio frequencychannels.  The airplanes continuously broadcast their posi-tion, velocity, callsigns, altitude,etc. using the automatic de-pendent surveillance-broadcast (ADS-B) wireless communi-cation protocol.  </p>
<p>many radio navigation aids such as GPS, VHF Omnidirec-tional  Radio  Range  (VOR),  Non-directional  radio  beacons(NDB), Distance Measuring Equipment (DME), and Instru-ment Landing System (ILS) play crucial roles during differ-ent phases of an airplane’s fligh</p>
<p>Many studies have already demonstrated that a number ofthe above-mentioned aviation systems are vulnerable to at-tacks.   For example,  researchers [21] injected non-existingaircraft  in  the  sky  by  merely  spoofing  ADS-B  messages.Some other attacks [36] modified the route of an airplane byjamming and replacing the ADS-B signals of specific vic-tim aircraft.  ACARS, the data link communications systembetween aircraft and ground stations was found to leak a sig-nificant  amount  of  private  data [49],  e.g.,  passenger  infor-mation, medical data and sometimes even credit card details</p>
<p>One of the most critical phases of an airplane’s flight planis the final approach or landing phase as the plane descendstowards the ground actively maneuvered by the pilot.</p>
<p>Several technologies and systems such as GPS, VOR, DMEassist the pilot in landing the aircraft safely. The InstrumentLanding System (ILS) [1] is today the de-facto approach sys-tem used by planes at a majority of the airports as it is themost precise system capable of providing accurate horizontaland vertical guidance.</p>
<p>Out of these405,822 flight plans, 95% were instrument flight rule (IFR)plans.  Instrument flight rules are a set of instructions estab-lished by the FAA to govern flight under conditions in whichflying by visual reference is either unsafe or just not allowed.Also,  several European airports [13] prohibit aircraft fromlanding using visual flight rules during the night. ILS incor-porates radio technology to provide all-weather guidance topilots which ensures safe travel and any interference can becatastrophic</p>
<p>As  recently  as  September  2018,  the  pilots  of  Air  Indiaflight AI-101 reported an instrument landing system (ILS)malfunction  and  were  forced  to  do  an  emergency  landing.Even worse,  TCAS, ACARS, and a majority of other sys-tems that aid a smooth landing were unusable.</p>
<p>In order to evaluate the complete attack, we develop atightly-controlled  closed-loop  ILS  spoofer.   It  adjuststhe the adversary’s transmitted signals as a function ofthe  aircraft  GPS  location,  maintaining  power  and  de-viation consistent with the adversary’s target position,causing an undetected off-runway landing. We demon-strate the integrated attack on an FAA certified flight-simulator  (X-Plane),  incorporating  a  spoofing  regiondetection mechanism, that triggers the controlled spoof-ing on entering the landing zone to reduce detectability.</p>
<p>The first fully operational ILS was deployed in 1932 at theBerlin Tempelhof Central Airport, Germany. </p>
<p> ITU defines ILS [56] as“a radio navigation system which provides aircraft with hor-izontal and vertical guidance just before and during landingand at certain fixed points, indicates the distance to the refer-ence point of landing”.  Autopilot systems on some modernaircraft  [48] use ILS signals to execute a fully autonomousapproach and landing,  especially in low visibility settings</p>
<p>ILS signals are generated and transmitted such that the wavesform a specific radio frequency signal pattern in space to cre-ate guidance information related to the horizontal and verti-cal positioning.  ILS signal generators leveragespace mod-ulation</p>
<p>Localizer.The localizer subsystem consists of an array ofmultiple antennas that emit the CSB and SBO signals suchthat the 150 Hz modulation predominates to the right of therunway centerline and the 90 Hz signal prevails to the left.</p>
<p>Each runway operates its lo-calizer at a specific carrier frequency (between 108.1 MHz to111.95 MHz) and the ILS receiver automatically tunes to thisfrequency </p>
<p>runway identifieris transmitted using a 1020 Hz morse code </p>
<p>The glideslope subsystem uses two antennas</p>
<p>  The mixing of the CSB and SBO signals re-sults in a pattern in which the 90 Hz component of the signalpredominates  in  the  region  above  the  glide-path  while  the150 Hz prevails below the glide-path.  The glideslope usescarrier  frequencies  between  329.15  MHz  and  335.0  MHz,</p>
<p>The combined signals received at the aircraft are amplified,demodulated, and filtered to recover the 90 Hz and 150 Hzcomponents. </p>
<p>For example, an aircraft that is on-course will receive both90 and 150 Hz signals with the same amplitude</p>
<p>3    Wireless Attacks on ILSWe  demonstrate  two  types  of  wireless  attacks:   i)  Over-shadow  attack  and  ii)  Single-tone  attack.In  the  over-shadow attack, the attacker transmits pre-crafted ILS signalsof higher signal strength;  thus overpowering the legitimateILS signals. The single-tone attack is a special attack whereit is sufficient for the attacker to transmit a single frequencytone signal at a specific signal strength (lower than the legit-imate ILS signal strength) to interfere and control the deflec-tions of the course deviation indicator needle.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
