Cybersecurity analysis of train control systems: weak points and practical, low-cost attacks. ??၊၊||၊????
A group of railway security experts from Italy and Finland released a paper in 2023 examining cybersecurity risks in modern railway signalling systems, especially Communication-Based Train Control (CBTC).
The authors frame their analysis using CENELEC TS 50701 and focus on two main topics:
1️⃣ Analyzing wireless jamming attacks on Eurobalises
2️⃣ Evaluating Wi-Fi as a “conduit” inside trains
In summary: attackers don’t need sophisticated hacking tools to disrupt a train’s signalling - a simple powered wire loop is enough to jam a Eurobalise.
The paper is very detailed and interesting, especially if it’s your day job to protect such systems. Please share it with colleagues and friends who do so.
More details:
Cybersecurity Considerations for Communication Based Train Control [PDF]: https://oulurepo.oulu.fi/bitstream/handle/10024/45840/nbnfi-fe20230830113271.pdf?sequence=1&isAllowed=y
目录
最新
- Hacking self-driving cars in the real world: laser pointer attacks & drones that make cars disappear. 🚗⚡😎🚨💥
- Reverse engineering of the Fermax intercom system: ongoing hardware security research. 🚪📸🔬 👨🏻💻🧰
- Hacking with malicious USB drives or malicious QR codes? The most effective way to break in. 🥷🏻💾𝄃𝄃𝄂𝄂𝄀𝄁𝄃𝄂𝄂𝄃🧱🏆
- How to become a Android 𝗁̶𝖺̶𝖼̶𝗄̶𝖾̶𝗋̶ security researcher: malware, exploitation and more. 🎓🔬👨🏻🏭🧠👨🏻💻
- Hacking a Linux device with TPM + LUKS encryption: extracting the TPM key from SPI in plaintext. 🐧💻👂🔑🎉
- Hacking a GE fridge with a hardened STM32: Bypassing new protections to extract flash memory. 🧊🪛👨💻🪠💾
- Security & privacy in the Tile tracking system: the first (public) security analysis of its protocol. 🐾🗺️🎯👨🏻💻🛠️
- Hacking using AI-written exploits: human tests of LLM agents’ PoCs show they are almost all fake. 🤖🖋️📜👨🏻💻🤡