Flying Blind: Navigating the Turbulent Skies of Aviation Cybersecurity
This talk explores the current state of aviation cybersecurity, highlighting the lack of robust antivirus and intrusion detection systems in commercial aircraft. The speakers discuss the risks associated with increasingly interconnected, fly-by-wire systems and the potential for malicious interference with critical flight data. They emphasize the need for improved security policies, better instrumentation, and the adoption of DevSecOps practices within the aviation industry to mitigate these vulnerabilities.
Why Your Next Flight Might Be Running on Unpatched, Insecure Avionics
TLDR: Modern commercial aircraft rely on interconnected, fly-by-wire systems that lack basic security controls like intrusion detection or antivirus. Research presented at DEF CON 2024 highlights how GPS spoofing and firmware manipulation pose critical risks to flight management systems. Pentesters and researchers should prioritize investigating these aviation-specific protocols, as the industry is only beginning to adopt the DevSecOps practices common in other sectors.
Aviation cybersecurity is currently in the same state that automotive security was a decade ago. We are seeing a rapid shift toward interconnected, software-defined flight systems, yet the underlying architecture remains largely devoid of the security primitives we take for granted in enterprise IT. When you look at the avionics stack of a modern commercial aircraft, you are looking at a collection of systems that were designed for high availability and physical safety, not for resilience against a motivated adversary with network access.
The Reality of Fly-by-Wire Vulnerabilities
The core issue is that commercial aircraft are increasingly reliant on fly-by-wire systems where software commands replace mechanical linkages. These systems are not isolated. They communicate over data buses that were never designed with authentication or encryption in mind. If an attacker gains access to the internal network of an aircraft, they are essentially operating in a flat, trusted environment.
GPS spoofing and jamming are the most immediate, high-impact threats. Because flight management systems (FMS) rely heavily on GPS for navigation and timing, manipulating these signals can lead to significant deviations in flight path or, more dangerously, desynchronization of onboard systems. While the industry has long treated GPS as a reliable source of truth, the reality is that signal integrity can be compromised with relatively low-cost hardware.
Bridging the Gap Between Bits and Effects
One of the most compelling takeaways from recent research is the concept of "Bits to Effect." In a standard DevSecOps pipeline, we collect telemetry, analyze it, and push updates to fix vulnerabilities. In aviation, this loop is broken. There is no standard mechanism for real-time intrusion detection on the data bus, and the process for pushing a firmware update to an avionics component is a multi-year, multi-million dollar endeavor.
For a researcher, the attack surface is vast. You are looking at:
- Insecure Firmware Updates: Many avionics components lack cryptographic signing for firmware, allowing for the injection of malicious code during maintenance cycles.
- Lack of Intrusion Detection: There is no equivalent to a host-based IDS or network-based IDS on the aircraft data bus. If a packet is on the wire, it is processed.
- Data Manipulation: Attackers can inject false sensor data into the FMS, causing the system to make incorrect flight control decisions based on bad inputs.
If you are a pentester looking to get into this space, start by familiarizing yourself with the ARINC 429 standard. This is the technical standard for the data bus used in most commercial and transport aircraft. Understanding how these frames are structured is the first step toward identifying how they can be manipulated.
The Path Forward for Security Researchers
We cannot continue to rely on "security through obscurity" for critical flight systems. The industry needs to move toward a model where telemetry is automatically collected and analyzed to identify anomalies in real-time. This is exactly what the big tech companies have done to achieve system reliability, and it is the only way to secure aviation.
For those of us in the research community, the opportunity is to help define what "secure" looks like in this environment. We need to push for better instrumentation of these systems. We need to advocate for the adoption of OWASP principles in the development of flight software, specifically focusing on input validation and secure communication protocols.
If you are working on a bug bounty program or a penetration test that touches on IoT or embedded systems, look for the overlaps with aviation. The protocols might be different, but the fundamental flaws—lack of authentication, reliance on unverified sensor data, and insecure update mechanisms—are identical. The next time you are on a flight, remember that the systems keeping you in the air are essentially running on a network that would fail a basic security audit in any other industry. That is not a reason to panic, but it is a massive, untapped area for security research that will define the safety of the next generation of air travel.
Vulnerability Classes
Target Technologies
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Unsaflock: Unlocking Millions of Hotel Locks

