SlideShare a Scribd company logo
1 of 43
Download to read offline
Hey Captain, Where’s Your Ship?
Attacking Vessel Tracking Systems for
Fun and Profit
Marco Balduzzi, Kyle Wihoit, Alessandro Pasta
(@embyte / IZ2PMO, @lowcalspam, IZ2RPA)
Ingredients
Automatic Identification System
●

Tracking system for ships
–

Centralized management for port authorities (VTS)

–

Ship-to-ship communication in open-sea

●

Used for plot, course, position, and speed

●

Some Applications:
–

Vessel Traffic Services

–

Collision Avoidance

–

Maritime Security

–

Aids to Navigation (AtoN)

–

Search and rescue, Accident investigation

–

Binary messages, e.g. weather forecasting
3
Automatic Identification System
●

●

Introduce to supplement the existing safety
systems, e.g. traditional radars
IMO agreement 2002, widely used since 2006
–

–

●

Required on any international ship with gross
tonnage of 300 or more tons.
Also required on ALL passenger ships regardless
of size

Estimated 400,000 installations. Expected
over a million within 2014.
4
5
Online AIS Services
●

●

Collects and
visualizes ships
information
Upstream done via:
–

Email

–

TCP/UDP Socket

–

Commercial Software

–

Smartphone Apps

–

Radio-Frequency
Gateways (deployed
regionally)

6
MarineTraffic Demo

7
AIS Application Layer
●

AIVDM Sentences

●

NMEA Sentences , as GPS
!AIVDM,1,1,,B,177KQJ5000G?tO`K>RA1wUbN0TKH,0*5C
TAG, FRAG_#, FRAG_ID, N/A, CHANNEL, PAYLOAD, PAD, CRC

8
Message 1/18: Position Report
Maritime Mobile Service Identity (MMSI)
number: Shared among multiple messages
●

●

●

Longitude, latitude, navigation status, speedover-ground (SOG), course-over-ground
(COG)
Sent every 3 to 30 seconds, depending from
ship speed
168 bits
9
Message 24: Static Report
●

Types 24A [160 bits] and 24B [168 bits]

●

Name, callsign, dimension

●

Type of ship and cargo type, e.g.
–

35: Engaged in military operations

–

51: Search and rescue

–

55: Law enforcement

–

5X: Carrying dangerous goods (e.g. Nuclear)

10
Few-Others
●

Type 8: Binary Broadcast Message
–

●

Type 22: Channel-Management
–

●

Weather Forecasting
Reserved for Port Authorities

Type 14: Safety-Related Broadcast Message
–

SOS, Man-In-Water

11
Generate Valid AIVDM Sentences

12
AIVDM_Encoder Example
●

Example of generation of AIVDM Sentence for

●

Ship involved in Military Operations

●

Named HiTB13

13
Identified Threats
●

Grouped in two macro families:
–

Implementation-specific VS protocol-specific

14
Spoofing Attack
●

Ships, AtoN, Aircrafts

15
North Korea... What?!

16
And...

17
Autopwning
●
●

Script to make a ship follow a path over time
Programmed with Google Earth's KML/KMZ
information

18
Ship Hijacking via AIS Gateway

19
Eleanor Gordon
●

Eleanor Gordon...Real ship...

20
Eleanor Gordon Popping Up in
Dallas?

21
Landing Lake

22
Replay Attack

23
24
AIS Communication over the Air
●

No authentication, no integrity check

●

Protocol designed in a “hardware-epoch”

●

Hacking: Difficult and cost expensive

●

Fake AIS Signals?

●

Let's do it via software!

25
SDR: Software Defined Radio
●

Paradigm switch from Hardware to Software

●

Reduced costs, Reduced complexity, Increased flexibility

●

Many application, e.g. Radio/TV receiver, 20 USD

●

Accessible by many, bad guys included!

26
GnuRadio and USRP Synergy

Universal Software Radio Peripheral

27
AIS Transmitter

●

GnuRadio flowchart
message on the air

for

●

AIS

4 main components / blocks

●

transmitting

IDE → Python script

28
AIS Frame Builder
●

Implements the AIS Stack (C code)

●

Builds the Frame to be modulated

29
30
Equipment

Universal Software Radio Peripheral

AIS Transceiver

31
Outdoor experiments

Standard VHF Transceiver (Radio)
MOXXON Directional Antenna
32
Attack 1: Man-in-water Spoofing
●

Fake a "man-in-the-water" distress beacon at
any location

●

Similar to Avalanche Safety Beacons

●

<live demo>

33
Attack 2: Frequency Hopping [1/2]
●

Disable AIS transponders
–

Up to 5 weeks

●

Switch to non-default frequency

●

Stored in flash memory

●

Specify a desired targeted region
–

●

Geographically remote region applies as well

E.g. Pirates can render a ship invisible in
Somalia

34
Attack 2: Frequency Hopping [2/2]

35
Attack 3: CPA Alerting [1/2]
●

Fake a CPA alert (Closest Point of Approach)
and trigger a collision warning alert.

36
Attack 3: CPA Alerting [2/2]

37
Attack 4: Weather Forecasting

38
Real-World Experiment
●

Generate a valid over-the-air AIS message

●

Target: AIS proxy

●

Demo

39
Responsible Disclosure
●

Our experiments are conducted without interfering
with existing systems
–

●

●

We reached out the appropriate providers and
authorities within time
Online providers:
–

●

Messages with safety-implications tested only in remote
lab environment

MarineTraffic, AisHub, VesselFinder, ShipFinder

Standard bodies:
–

ITU-R: 11 September 2013

–

IALA, IMO, US Coast Guards: No answer yet
40
Countermeasures
●

Authentication
–

●

Integrity Monitoring
–

●

Tamper checking of AIS message

Time Check
–

●

Ensure the transmitter is the owner

Avoid replay attack

Validity Check on Data Context
–

E.g., Geographical information
41
Take Home
●

AIS is widely used – Mandatory installation

●

AIS is a major technology in marine safety

●

AIS is broken at implementation-level

●

AIS is broken at protocol-level

●

We hope that our work will help in raising the
issue and enhancing the existing situation!

42
Questions?

●

Thanks! FTR, Germano (IW2DCK), ITU-R
43

More Related Content

What's hot

USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)Sharat Sawhney
 
Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»CHAOS - Digital Design Studio
 
Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab AB
 
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way Radio
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way RadioIntroducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way Radio
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way RadioIcom UK Ltd
 
Satellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationSatellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationFlightcell International
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distroMike Saunders
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017Mike Saunders
 
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...Teamnet International
 
AQYR-Diamondback-AutoAQYR-3-16-WEB
AQYR-Diamondback-AutoAQYR-3-16-WEBAQYR-Diamondback-AutoAQYR-3-16-WEB
AQYR-Diamondback-AutoAQYR-3-16-WEBMark Wheeler
 
Sogei2014 lisi v01
Sogei2014 lisi v01Sogei2014 lisi v01
Sogei2014 lisi v01Marco Lisi
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015Zenie Noon
 
Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Saab AB
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 shortJohn Jeffers
 
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan Smith
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan SmithELECTRONIC EMISSION FROM THE GA FLEET by Jonathan Smith
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan SmithALIAS Network
 

What's hot (20)

USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
 
Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»
 
Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014
 
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way Radio
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way RadioIntroducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way Radio
Introducing the Icom IP730D Hybrid LTE/Licenced Professional Two Way Radio
 
Satellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationSatellite and Cellular Communications for Aviation
Satellite and Cellular Communications for Aviation
 
SigfoxGettingStarted
SigfoxGettingStartedSigfoxGettingStarted
SigfoxGettingStarted
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
20171106 - Workshop lille
20171106 -  Workshop lille20171106 -  Workshop lille
20171106 - Workshop lille
 
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...
Teamnet: Using fixed and aerial sensors for mitigating risks caused by natura...
 
AQYR-Diamondback-AutoAQYR-3-16-WEB
AQYR-Diamondback-AutoAQYR-3-16-WEBAQYR-Diamondback-AutoAQYR-3-16-WEB
AQYR-Diamondback-AutoAQYR-3-16-WEB
 
Secure transport
Secure transportSecure transport
Secure transport
 
Sogei2014 lisi v01
Sogei2014 lisi v01Sogei2014 lisi v01
Sogei2014 lisi v01
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015
 
FINAL
FINALFINAL
FINAL
 
Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 short
 
Krypto500
Krypto500Krypto500
Krypto500
 
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan Smith
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan SmithELECTRONIC EMISSION FROM THE GA FLEET by Jonathan Smith
ELECTRONIC EMISSION FROM THE GA FLEET by Jonathan Smith
 
Aes%20 ah jdocument
Aes%20 ah jdocumentAes%20 ah jdocument
Aes%20 ah jdocument
 

Viewers also liked

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation DayAcrodex
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Acrodex
 

Viewers also liked (20)

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day
 

Similar to Captain, Where Is Your Ship – Compromising Vessel Tracking Systems

AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)MTI Co., Ltd.
 
3.1 gpt system introduction
3.1 gpt system introduction3.1 gpt system introduction
3.1 gpt system introductionYiChao4
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018Aurelien Lequertier
 
3.1 gpt system introduction
3.1 gpt system introduction3.1 gpt system introduction
3.1 gpt system introductionYiChao4
 
GL200_pacific_SAFRICA
GL200_pacific_SAFRICAGL200_pacific_SAFRICA
GL200_pacific_SAFRICALloyd Brink
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...Mikael Falkvidd
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan BrochureS H Vazifdar
 
SOLAS - High Value (Telemetry)
SOLAS - High Value (Telemetry)SOLAS - High Value (Telemetry)
SOLAS - High Value (Telemetry)Jeff Douglas
 
FOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS applicationFOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS applicationThe European GNSS Agency (GSA)
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisAurelien Lequertier
 
AMTS product catalog Marine
AMTS product catalog Marine AMTS product catalog Marine
AMTS product catalog Marine Arnaud Teigeler
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIONicolas Lesconnec
 
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION DrunkenSoul
 
IRJET- Boat Localization and Warning System for Border Identification
IRJET-  	  Boat Localization and Warning System for Border IdentificationIRJET-  	  Boat Localization and Warning System for Border Identification
IRJET- Boat Localization and Warning System for Border IdentificationIRJET Journal
 

Similar to Captain, Where Is Your Ship – Compromising Vessel Tracking Systems (20)

AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
Sigfox Euratech Workshop
Sigfox Euratech WorkshopSigfox Euratech Workshop
Sigfox Euratech Workshop
 
CITMO 2006
CITMO 2006CITMO 2006
CITMO 2006
 
SigfoxMakersDay Total
SigfoxMakersDay TotalSigfoxMakersDay Total
SigfoxMakersDay Total
 
Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)
 
3.1 gpt system introduction
3.1 gpt system introduction3.1 gpt system introduction
3.1 gpt system introduction
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018
 
3.1 gpt system introduction
3.1 gpt system introduction3.1 gpt system introduction
3.1 gpt system introduction
 
GL200_pacific_SAFRICA
GL200_pacific_SAFRICAGL200_pacific_SAFRICA
GL200_pacific_SAFRICA
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan Brochure
 
Lecture maritime ict - salwa
Lecture   maritime ict - salwaLecture   maritime ict - salwa
Lecture maritime ict - salwa
 
SOLAS - High Value (Telemetry)
SOLAS - High Value (Telemetry)SOLAS - High Value (Telemetry)
SOLAS - High Value (Telemetry)
 
FOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS applicationFOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS application
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParis
 
5.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa8475.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa847
 
AMTS product catalog Marine
AMTS product catalog Marine AMTS product catalog Marine
AMTS product catalog Marine
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
 
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
 
IRJET- Boat Localization and Warning System for Border Identification
IRJET-  	  Boat Localization and Warning System for Border IdentificationIRJET-  	  Boat Localization and Warning System for Border Identification
IRJET- Boat Localization and Warning System for Border Identification
 

More from Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromiseTrend Micro
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsTrend Micro
 
The Heart of KOOBFACE
The Heart of KOOBFACEThe Heart of KOOBFACE
The Heart of KOOBFACETrend Micro
 
The Real Face Of KOOBFACE
The Real Face Of KOOBFACEThe Real Face Of KOOBFACE
The Real Face Of KOOBFACETrend Micro
 

More from Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football Fanatics
 
The Heart of KOOBFACE
The Heart of KOOBFACEThe Heart of KOOBFACE
The Heart of KOOBFACE
 
The Real Face Of KOOBFACE
The Real Face Of KOOBFACEThe Real Face Of KOOBFACE
The Real Face Of KOOBFACE
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Captain, Where Is Your Ship – Compromising Vessel Tracking Systems