Report CAN Bus is insecure to hacking.
https://www.stuff.co.nz/travel/trav...ssues-hacking-security-alert-for-small-planes
https://www.stuff.co.nz/travel/trav...ssues-hacking-security-alert-for-small-planes
Report CAN Bus is insecure to hacking.
https://www.stuff.co.nz/travel/trav...ssues-hacking-security-alert-for-small-planes
This is not news, just someone applying what has been done in the Auto world to aviation. Wired did a piece on what someone could do if they had access to the CAN bus in Autos back in 2015 (Hint, this still required physical access in the first place):
https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
As others and even DHS have said, physical access is required. Do you realize that hackers could even hack your laptop if they got physical access to it? Seriously, this is a just silly.
Everyone is right - once you give physical access, all bets are off. But still, there are lots of ways that the CAN bus can and should be improved. Reminds me of the early days of ethernet and brokenring - plug something into the network and you could do anything.
Lots of scenarios I can think of that can be exploited with bad CAN security - rogue actor plugging something into the bus during maintenance, innocent actor plugging nefarious device in, etc.
This is what I work with all day...
To get anything done you need to have a risk based approach and protecting internal communication between devices in a GA/Experimental airplane is just not effort well spent.
I suppose it's a good thing we have AP servos that can be turned off...
And anyone that reads Simon Travaglia might even be worried that a hacker could find a way to disable a hard-wired servo power switch through a software hack.
Skylor