打开APP
userphoto
未登录

开通VIP,畅享免费电子书等14项超值服

开通VIP
GPS Software Attacks More Dangerous Than Jamm...
GPS Software Attacks More Dangerous Than Jamming and Spoofing, Experts Say
SHARE:
Adjust text size:
Security researchers from the Carnegie Mellon University, in collaboration with experts from Coherent Navigation, have identified new attack vectors against the Global Positioning System (GPS).
Numerous studies have demonstrated the fact that GPS is vulnerable to jamming and spoofing, but by viewing the GPS as a computer system, experts have managed to develop new attacks against this infrastructure.
Their experiments have demonstrated that GPS and GPS-dependent systems are far more vulnerable than we thought.
According to the researchers, a malicious 45-second GPS broadcast is capable of taking down more than 30% of the Continually Operating Reference Station (CORS) network, which is used for safety and life-critical applications. Furthermore, it could also disrupt 20% of the Networked Transport of RTCM via Internet Protocol (NTRIP) systems.
A total of three new attack methods have been identified: GPS data level attacks, GPS receiver software attacks, and GPS dependent system attacks.
GPS data level attacks are somewhat similar to spoofing, but they can cause more damage. For instance, such an attack can remotely crash a high-end receiver.
The second types of attacks leverage the fact that GPS receivers run some kind of computer software that can be remotely compromised.
The worst thing is that, since GPS receivers are most often seen as devices instead of computers, the security holes leveraged by attackers can remain unpatched for extended periods of time.
GPS dependent system attacks exploit the fact that GPS navigation solutions are considered to be trusted inputs by high-level software.
In order to mitigate such threats, experts recommend stronger verification of GPS receiver software and the deployment of regular software updates for IP-enabled devices.
Another mitigation strategy refers to the use of Electronic GPS Attack Detection System (EGADS) that alerts users when an attack is underway, and an Electronic GPS Whitening System (EGWS) that re-broadcasts a whitened signal to otherwise vulnerable receivers.
One noteworthy thing about these types of attacks is that they don’t require sophisticated or expensive equipment. The hardware utilized by the researchers costs only about $2,500 (1,950 EUR).
本站仅提供存储服务,所有内容均由用户发布,如发现有害或侵权内容,请点击举报
打开APP,阅读全文并永久保存 查看更多类似文章
猜你喜欢
类似文章
【热】打开小程序,算一算2024你的财运
The security risk in Web 2.0 | CNET News.com (1)
Android Security Overview | Android Open Sour...
Exclusive: Inside Google Spanner, the Largest Single Database on Earth | Wired Enterprise | Wired.co
护士日常(英语)常用语丨每天10句
波斯湾GPS干扰
Preventing SQL Injection in Java
更多类似文章 >>
生活服务
热点新闻
分享 收藏 导长图 关注 下载文章
绑定账号成功
后续可登录账号畅享VIP特权!
如果VIP功能使用有故障,
可点击这里联系客服!

联系客服