Threat Category: GPS
Threat Description: Spoofing may allow an attacker to confuse or control the location at which a mobile device calculates its position.
On the requirements for successful GPS spoofing attacks 1
Assessing the spoofing threat: Development of a portable GPS civilian spoofer. 2
Several countermeasures to be implemented in GPS receiver software have been presented in GPS Spoofing Countermeasures 3
N.O. Tippenhauer et al., “On the requirements for successful GPS spoofing attacks”, in Proceedings of the 18th ACM conference on Computer and communications security, 2011, pp. 75-86; www.cs.ox.ac.uk/files/6489/gps.pdf [accessed 8/23/2016] ↩
T.E. Humpreys et al. “Assessing the spoofing threat: Development of a portable GPS civilian spoofer.” in Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation, 2008, pp. 2314-2325; https://gps.mae.cornell.edu/humphreys_etal_iongnss2008.pdf [accessed 8/23/2016] ↩
J.S. Warner and R.G. Johnston, GPS Spoofing Countermeasures, tech. report LAUR-03-6163, Los Alamos National Laboratory, 2003; http://lewisperdue.com/DieByWire/GPS-Vulnerability-LosAlamos.pdf [accessed 8/25/2016] ↩