论文标题
ARINC 429航空公司的硬件指纹识别
Hardware Fingerprinting for the ARINC 429 Avionic Bus
论文作者
论文摘要
ARINC 429是当今民用航空电子产品中最常见的数据总线。但是,该协议缺乏任何形式的源身份验证。具有物理访问总线的技术人员能够用Rogue设备替换发射器,并且接收器将接受其恶意数据,因为他们没有验证消息真实性的方法。更新协议将关闭新飞机的安全漏洞,但需要修改数千架飞机。在此期间,直到替换协议为止,我们提出了第一个入侵检测系统,该系统利用ARINC 429数据总线的发送者标识的硬件指纹方法。我们的方法依赖于这样的观察结果,即硬件的变化,例如用流氓替换发射器或接收器,修改变速器的电信号。因为我们依靠模拟属性,而不是传输的数字内容,因此即使要传输的数据完全正常,我们也能够尽快检测到硬件开关。因此,我们能够在造成任何损害之前先抢占攻击。在本文中,我们描述了入侵检测系统的设计,并针对不同的对手模型评估了其性能。我们的分析包括理论马尔可夫链模型和广泛的经验评估。为此,我们收集了ARINC 429数据跟踪的数据语料库,这可能具有独立的兴趣,因为据我们所知,没有公共语料库可用。我们发现我们的入侵检测系统是非常现实的:例如,它每秒达到接近零的错误警报,同时检测到50ms以下的流氓发射器,并在3秒内检测出流氓接收器。换句话说,在飞机起飞之前,可以在飞行前检查中可靠地检测到技术人员攻击。
ARINC 429 is the most common data bus in use today in civil avionics. However, the protocol lacks any form of source authentication. A technician with physical access to the bus is able to replace a transmitter by a rogue device, and the receivers will accept its malicious data as they have no method of verifying the authenticity of messages. Updating the protocol would close off security loopholes in new aircraft but would require thousands of airplanes to be modified. For the interim, until the protocol is replaced, we propose the first intrusion detection system that utilizes a hardware fingerprinting approach for sender identification for the ARINC 429 data bus. Our approach relies on the observation that changes in hardware, such as replacing a transmitter or a receiver with a rogue one, modify the electric signal of the transmission. Because we rely on the analog properties, and not on the digital content of the transmissions, we are able to detect a hardware switch as soon as it occurs, even if the data that is being transmitted is completely normal. Thus, we are able to preempt the attack before any damage is caused. In this paper we describe the design of our intrusion detection system and evaluate its performance against different adversary models. Our analysis includes both a theoretical Markov-chain model and an extensive empirical evaluation. For this purpose, we collected a data corpus of ARINC 429 data traces, which may be of independent interest since, to the best of our knowledge, no public corpus is available. We find that our intrusion detection system is quite realistic: e.g., it achieves near-zero false alarms per second, while detecting a rogue transmitter in under 50ms, and detecting a rogue receiver in under 3 seconds. In other words, technician attacks can be reliably detected during the pre-flight checks, well before the aircraft takes off.