Google AI Professional Certificate - Learn AI Skills That Get You Hired
Become an AI & ML Engineer with Cal Poly EPaCE — IBM-Certified Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore critical vulnerabilities in aviation communication systems through this 23-minute DEF CON 33 conference talk that examines how voice cloning technology threatens air traffic control operations. Discover how consumer-grade devices and publicly available tools can create convincing voice replicas of air traffic controllers, potentially disrupting the trust-based communication system between pilots and controllers. Learn about the inherent weaknesses of AM radio systems used in aviation, including their low fidelity and lack of authentication mechanisms that make them susceptible to fraudulent communications. Examine trust factors within aviation's air traffic control infrastructure and identify where aircraft are most vulnerable to voice cloning attacks, particularly during critical operations like runway crossings and low-visibility conditions. Understand FCC enforcement techniques for tracking malicious actors, explore historical perspectives on alternative radio technologies, and review secondary communication systems pilots use during failures. Witness simulated attacks demonstrating how these vulnerabilities could disrupt aviation operations and evaluate existing safeguards including the Traffic Collision Avoidance System (TCAS), while discussing emerging protective technologies such as stop bars and guided runway lighting systems.
Syllabus
DEF CON 33 - Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - Andrew Logan
Taught by
DEFCONConference