Kuboid
Open Luck·Kuboid.in

Aviation GNSS: It's About Time Too

DEFCONConference2,031 views22:05over 1 year ago

This talk explores the critical role of time synchronization in aviation navigation systems and the security implications of GNSS/GPS spoofing. It details how position and time errors can trigger cascading failures in onboard systems like TCAS, CPDLC, and digital certificate validation. The presentation highlights the risks associated with the industry's increasing reliance on GNSS as legacy ground-based navigation aids are retired.

Why GNSS Spoofing is More Than Just a Location Error

TLDR: GNSS spoofing is no longer just about tricking a receiver into reporting the wrong coordinates. Modern research shows that manipulating time synchronization triggers cascading failures across critical avionics systems like TCAS and CPDLC. As the aviation industry retires legacy ground-based navigation aids in favor of GNSS, these time-based vulnerabilities create significant operational risks that require urgent attention from security researchers and system architects.

Aviation security often feels like a game of cat and mouse played at 30,000 feet. While most of the industry focuses on securing the network perimeter or hardening web applications, the underlying infrastructure that keeps aircraft in the sky is quietly shifting. We are moving away from robust, ground-based navigation aids like Non-Directional Beacons (NDB) and Very High Frequency Omnidirectional Range (VOR) toward a total reliance on Global Navigation Satellite Systems (GNSS). This transition is not just a change in technology; it is a fundamental shift in the threat model.

The core issue is that GNSS is not just a source of position. It is a primary source of time. When a receiver is spoofed, it does not just report a false latitude and longitude. It reports a false time. In a modern, highly connected aircraft, that time signal is the heartbeat of the entire avionics suite.

The Mechanics of Cascading Failure

When an attacker spoofs a GNSS signal, they are essentially injecting a false reality into the aircraft's navigation computer. If the spoofing is subtle, the aircraft might not immediately reject the signal. Instead, it begins to drift. This drift is where the real danger lies.

Consider the Traffic Collision Avoidance System (TCAS). TCAS relies on precise time synchronization to coordinate with other aircraft and prevent mid-air collisions. If the time signal provided by the GNSS receiver is manipulated, the TCAS unit may miscalculate the proximity of other aircraft. This can trigger unnecessary collision alerts, forcing pilots to perform evasive maneuvers based on phantom threats.

The impact extends to the Controller-Pilot Data Link Communications (CPDLC), which allows for digital messaging between air traffic control and the cockpit. These systems often rely on digital certificates to ensure the authenticity of messages. If the spoofed time signal pushes the aircraft's clock outside the validity window of these certificates, the communication link can fail entirely. The aircraft is then forced to revert to standard VHF radio, which is significantly less efficient and increases the workload for both the pilot and air traffic control.

The Poisoning of Inertial Reference

Most commercial aircraft use an Inertial Reference System (IRS) to maintain navigation when GNSS signals are unavailable or unreliable. The IRS uses high-precision accelerometers and gyroscopes to calculate position based on movement from a known starting point. Because the IRS is not perfectly accurate over long durations, it is periodically updated by the GNSS receiver.

This is where the vulnerability becomes critical. If the GNSS signal is being spoofed, the aircraft's navigation computer will use that false data to update the IRS. This process, known as "poisoning," effectively corrupts the aircraft's internal navigation state. Once the IRS is poisoned, the aircraft may be unable to recover its true position even after leaving the area of spoofing. The pilot is then forced to perform a manual reset of the navigation system, which typically requires the aircraft to be stationary on the ground.

Real-World Implications for Researchers

For a penetration tester or security researcher, this research highlights a critical gap in how we approach IoT and embedded security. We often treat devices as isolated units, but in aviation, the integration is absolute. A vulnerability in a low-cost GNSS receiver can lead to a total loss of navigation and communication capabilities.

If you are conducting a security assessment on an embedded system that relies on GNSS, you must look beyond the coordinate output. Investigate how the system handles time synchronization. Does it have a fallback mechanism? How does it validate the time signal against other sources? If the device is part of a larger network, what happens to the downstream systems when the time signal is manipulated?

The OpsGroup has been doing excellent work documenting these incidents in real-time. Their reports show that spoofing is not just a theoretical exercise; it is happening in contested airspaces around the world. These incidents are not just affecting military assets; they are impacting commercial flights, forcing them to divert or rely on outdated navigation procedures.

The Defensive Path Forward

Defending against GNSS spoofing is difficult because the signal itself is inherently weak and easy to overpower. The solution is not to build a better receiver, but to build a more resilient system. We need to move toward a hybrid navigation model where GNSS is just one of many inputs. By cross-referencing GNSS data with other sources like Distance Measuring Equipment (DME) or even celestial navigation, we can detect and reject spoofed signals before they reach the navigation computer.

We must also be cautious about the rapid retirement of ground-based navigation aids. While these systems are expensive to maintain, they provide a critical layer of safety that GNSS cannot replicate. If we remove them entirely, we are creating a single point of failure that is increasingly attractive to attackers.

Security is not about eliminating all risks; it is about managing them. In aviation, that means ensuring that when the primary system fails, there is always a secondary, independent, and verifiable source of truth. We need to stop treating time as a constant and start treating it as a critical, and potentially compromised, data point.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in