SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
AIS Exposed
New Vulnerabilities and Attacks
Marco Balduzzi & Alessandro Pasta
(Kyle Wilhoit)
[HITB AMS, 29 May 2014]
Outline
● Balduzzi et al. , October 2013, HITB KUL ++
3
Automatic Identification System
● AIS, Automatic Identification System
● Tracking system for vessels
– Ship-to-ship communication
– From/to port authorities (VTS)
● Some applications:
– Maritime security (piracy)
– Collision avoidance
– Search and rescue
– Accident investigation
– Binary messages, e.g. Weather forecasting
4
Required Installation
● Since 2002
● Introduced to supplement existing safety
systems, e.g. traditional radars
● Required on:
– ANY International ship with gross tonnage of 300+
– ALL passenger ships regardless of size
● Estimated 400,000 installations
● Expected over a million
5
6
Data Exchange
● AIS messages are exchanged in two forms:
● Radio-frequency (VHF) – 162 ± 0.25 MHz
● Online AIS Providers
7
Online Providers
● Collect and visualize
vessels information
● Data upstream via:
– Mobile Apps,
Software
– Email
– API
– Radio-frequency
gateways deployed
regionally
8
Example – Port of AMS
● MarineTraffic.com
9
Example – RF Transponder
● OpenCPN Chart Plotter + AIS Transponder
10
Identified Threats
● Grouped in two macro categories
● 1. Implementation-specific = Online Providers
[Software]
VS
● 2. Protocol-specific = AIS Transponders
[RF / VHF]
11
AIS Application Layer
● AIVDM messages, e.g.:
– Position reports
– Static reports
– Management (channel...)
– Safety-related (SART)
● NMEA sentences , as GPS
!AIVDM,1,1,,B,177KQJ5000G?tO`K>RA1wUbN0TKH,0*5C
TAG, FRAG_#, FRAG_ID, N/A, CHANNEL, PAYLOAD, PAD, CRC
12
AIVDM Encoder
13
Example
● Ship involved in Military Operations
● MMSI 247 320162 (Italy)
14
Spoofing – Online Providers
● Ships or Aids-to-Navigation
15
US to North Korea... What?!
● Wargames (1983) or cyberwar?
16
Programming a malicious route
● Tool to make a ship follow a path over time
● Programmed with Google Earth's KML/KMZ
information
17
Hijacking (Rouge Gateway)
18
Example
● “Move” a real ship – Eleanor Gordon
19
Popping Up in Dallas?
20
Radio-Frequency (VHF) Threats
21
AIS Communication over the Air
● Protocol designed in a “hardware-epoch”
● Hacking was difficult and cost expensive
● No authentication, no integrity check
● 2014
● Craft AIS signals?
● Let's do it via software!
22
SDR – Software Defined Radio
● Many applications, e.g. Radio / TV receivers,
20 USD
● Radio amateurs, SDR transmitters
● Reduced costs
● Reduced complexity
● Increased flexibility
● Accessible by many, pirates included!
23
Our Testing Lab
24
AIS Transmitter
● Built & implemented a software-based AIS transmitter
● GnuRadio, http://gnuradio.org/
● Custom block: AIS Frame Builder [Ref, HITB KUL 2013]
25
RF Spoofing
● Radio-frequency (VHF) version of spoofing
● Setup : [Attacker] – [Victim]
● Amplifier : 20+ km (modified radio)
26
Victim's Console
27
Injecting into legit AIS gateways
28
Man-in-water Spoofing
● Fake a "man-in-the-water" distress beacon
● Trigger SART (S.O.S.) alerts
● Visually and acoustically
● Lure a victim vessel into navigating to a hostile
and attacker-controller sea space
● Mandatory by legislation
29
Man-in-water Spoofing
30
Frequency Hopping (DoS++)
● Disable AIS transponders
● Switch to non-default frequency (RX and TX)
● Single or multiple target(s)
● Program a desired targeted region
– Geographically remote region applies as well
● For example: Pirates can render a ship
“invisible” upon entering Somalia
31
Frequency Hopping (DoS++)
32
CPA Alerting
● Fake a CPA alert, Closest Point of Approach
● Trigger a collision warning alert
● Possibly alter course
33
CPA Alerting
34
Malicious Weather Forecasting
35
Slot Starvation (DoS++)
● Impersonate port authority
● Base station spoofing
● Book TDMA slots
36
Slot Starvation (DoS++)
● Base Station Spoofing
37
Slot Starvation (DoS++)
● Victim's Console
38
Timing Attack (DoS++)
● Instruct an AIS transponder to delay its
transmission in time
● Default broadcast time:
– Static reports = 6 min
– Dynamic reports = 0.5 to 3 min (depending on
speed)
● Attack code:
–
39
Hardware Panic! (DoS)
● Flood the device... Noise on Channel + GPS
40
Back to the r00ts
● AIS = Attack Vector
● AIVDM messages are exchanged and
processed at application layer by back-end
software
– In VTS server installations
● Binary message, special type used for
– Crew members, Number of passengers
– Environment information
● Malicious payloads, e.g. BOF, SQLi, …
41
Back to the r00ts
● SQL Error in back-end processing
42
Attacking D-GPS
● Differential Global Positioning System (D-GPS)
● Used by port authorities to increase the precision
of traditional GPS (meters → centimeters)
● Attack = Spoof D-GPS beacons to force ships
into calculating a wrong “GPS position”!
● Message 17: GNSS broadcast binary message
43
Attacking D-GPS
● Similar to “UT Austin Researchers Spoof
Superyacht at Sea” – Monday, 29 July 2013
44
Responsible Disclosure
● Experiments conducted without interfering
with existing systems
– Messages with safety-implications tested only in
lab environment (wired connections)
● We reached out the appropriate providers and
authorities within time
– MarineTraffic, AisHub, VesselFinder, ShipFinder
– ITU-R, IALA, IMO, US Coast Guards
45
Proposed countermeasures
● Authentication
– Ensure the transmitter is the owner (spoofing)
● Time Check
– Avoid replay attack
● Integrity Monitoring
– Tamper checking of AIS message (hijacking)
● Validity Check on Data Context
– E.g., Geographical information
46
Take Home
● AIS is widely used – Mandatory installation
● AIS is a major technology in marine safety
● AIS is broken at implementation-level
● AIS is broken at protocol-level
● We hope that our work will help in raising the
issue and enhancing the existing situation!
47
Thanks!
● Dr. Marco Balduzzi – @embyte
● Alessandro Pasta – @aka_pastus
48
Bonus ;-)
● Real-World Experiment
● Simulate the operational conditions of an
attacker at sea
● Coverage experiment
● Target: AIS Gateway Installation
● No time for demo video. Visit me offline

Mais conteúdo relacionado

Mais procurados

SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
Mike Saunders
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015
Zenie Noon
 

Mais procurados (19)

Pressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore AirshowPressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore Airshow
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
SigfoxGettingStarted
SigfoxGettingStartedSigfoxGettingStarted
SigfoxGettingStarted
 
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParis
 
Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
Vsat 2011 gilat_ka band
Vsat 2011 gilat_ka bandVsat 2011 gilat_ka band
Vsat 2011 gilat_ka band
 
Satellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationSatellite and Cellular Communications for Aviation
Satellite and Cellular Communications for Aviation
 
Krypto500
Krypto500Krypto500
Krypto500
 
ComNet NWKED Data Sheet
ComNet NWKED Data SheetComNet NWKED Data Sheet
ComNet NWKED Data Sheet
 
Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»
 
Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016
 
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
 
MTXM2M modem catalog 2015
MTXM2M modem catalog 2015MTXM2M modem catalog 2015
MTXM2M modem catalog 2015
 
MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015
 
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
 
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalThotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015
 

Destaque

HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...
Venkatesh Prabhu
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
Sanoj Kumar
 

Destaque (20)

Plead APT @ EECTF 2016
Plead APT @ EECTF 2016Plead APT @ EECTF 2016
Plead APT @ EECTF 2016
 
Softworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateSoftworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation Template
 
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyAvian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case study
 
Presentation1
Presentation1Presentation1
Presentation1
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02
 
Personal informatic
Personal informaticPersonal informatic
Personal informatic
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Adauga un text
Adauga un textAdauga un text
Adauga un text
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 
Possessive adjectives
Possessive adjectivesPossessive adjectives
Possessive adjectives
 
Why AIS is not always enough
Why AIS is not always enoughWhy AIS is not always enough
Why AIS is not always enough
 
Abusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingAbusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User Profiling
 
Cctk support for setting hdd password
Cctk support for setting hdd passwordCctk support for setting hdd password
Cctk support for setting hdd password
 
TUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMTUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEM
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов Small
 

Semelhante a AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)

presentations-amp_imo_presentation
presentations-amp_imo_presentationpresentations-amp_imo_presentation
presentations-amp_imo_presentation
Jeff Douglas
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan Brochure
S H Vazifdar
 
Accessing new tech. trends for the rapid tactical command rtc.
Accessing new tech. trends for the rapid tactical command   rtc.Accessing new tech. trends for the rapid tactical command   rtc.
Accessing new tech. trends for the rapid tactical command rtc.
ZikweMsimang
 
Mission Systems overview.pdf
Mission Systems overview.pdfMission Systems overview.pdf
Mission Systems overview.pdf
PrestonJerry
 

Semelhante a AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014) (20)

Automatic-identification system gr1.pptx
Automatic-identification system gr1.pptxAutomatic-identification system gr1.pptx
Automatic-identification system gr1.pptx
 
presentations-amp_imo_presentation
presentations-amp_imo_presentationpresentations-amp_imo_presentation
presentations-amp_imo_presentation
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2
 
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
 
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive..."Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
 
The Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus IIThe Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus II
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
Dfrc perseus
Dfrc perseusDfrc perseus
Dfrc perseus
 
5.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa8475.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa847
 
EGNSS for robots - GSA special prize
EGNSS for robots - GSA special prizeEGNSS for robots - GSA special prize
EGNSS for robots - GSA special prize
 
20th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v0320th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v03
 
GLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemGLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking System
 
VESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEMVESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEM
 
Lecture maritime ict - salwa
Lecture   maritime ict - salwaLecture   maritime ict - salwa
Lecture maritime ict - salwa
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan Brochure
 
Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01
 
Accessing new tech. trends for the rapid tactical command rtc.
Accessing new tech. trends for the rapid tactical command   rtc.Accessing new tech. trends for the rapid tactical command   rtc.
Accessing new tech. trends for the rapid tactical command rtc.
 
AUV based on EL - Copy
AUV based on EL - CopyAUV based on EL - Copy
AUV based on EL - Copy
 
INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017
 
Mission Systems overview.pdf
Mission Systems overview.pdfMission Systems overview.pdf
Mission Systems overview.pdf
 

Mais de Marco Balduzzi

Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
Marco Balduzzi
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Marco Balduzzi
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
Marco Balduzzi
 
The (in)security of File Hosting Services
The (in)security of File Hosting ServicesThe (in)security of File Hosting Services
The (in)security of File Hosting Services
Marco Balduzzi
 

Mais de Marco Balduzzi (13)

Lost in Translation: When Industrial Protocol Translation goes Wrong [CONFide...
Lost in Translation: When Industrial Protocol Translation goes Wrong [CONFide...Lost in Translation: When Industrial Protocol Translation goes Wrong [CONFide...
Lost in Translation: When Industrial Protocol Translation goes Wrong [CONFide...
 
CTS @ HWIO2020 Awards Cerimony
CTS @ HWIO2020 Awards CerimonyCTS @ HWIO2020 Awards Cerimony
CTS @ HWIO2020 Awards Cerimony
 
SCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled TechnologiesSCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
 
Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)Attacking Industrial Remote Controllers (HITB AMS 2019)
Attacking Industrial Remote Controllers (HITB AMS 2019)
 
Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
Using Machine-Learning to Investigate Web Campaigns at Large - HITB 2018
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Automated Detection of HPP Vulnerabilities in Web Applications Version 0.3, B...
Automated Detection of HPP Vulnerabilities in Web Applications Version 0.3, B...Automated Detection of HPP Vulnerabilities in Web Applications Version 0.3, B...
Automated Detection of HPP Vulnerabilities in Web Applications Version 0.3, B...
 
The (in)security of File Hosting Services
The (in)security of File Hosting ServicesThe (in)security of File Hosting Services
The (in)security of File Hosting Services
 
Stealthy, Resilient and Cost-Effective Botnet Using Skype
Stealthy, Resilient and Cost-Effective Botnet Using SkypeStealthy, Resilient and Cost-Effective Botnet Using Skype
Stealthy, Resilient and Cost-Effective Botnet Using Skype
 
New Insights into Clickjacking
New Insights into ClickjackingNew Insights into Clickjacking
New Insights into Clickjacking
 
Paper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking AttacksPaper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking Attacks
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)

  • 1. AIS Exposed New Vulnerabilities and Attacks Marco Balduzzi & Alessandro Pasta (Kyle Wilhoit) [HITB AMS, 29 May 2014]
  • 2. Outline ● Balduzzi et al. , October 2013, HITB KUL ++
  • 3. 3 Automatic Identification System ● AIS, Automatic Identification System ● Tracking system for vessels – Ship-to-ship communication – From/to port authorities (VTS) ● Some applications: – Maritime security (piracy) – Collision avoidance – Search and rescue – Accident investigation – Binary messages, e.g. Weather forecasting
  • 4. 4 Required Installation ● Since 2002 ● Introduced to supplement existing safety systems, e.g. traditional radars ● Required on: – ANY International ship with gross tonnage of 300+ – ALL passenger ships regardless of size ● Estimated 400,000 installations ● Expected over a million
  • 5. 5
  • 6. 6 Data Exchange ● AIS messages are exchanged in two forms: ● Radio-frequency (VHF) – 162 ± 0.25 MHz ● Online AIS Providers
  • 7. 7 Online Providers ● Collect and visualize vessels information ● Data upstream via: – Mobile Apps, Software – Email – API – Radio-frequency gateways deployed regionally
  • 8. 8 Example – Port of AMS ● MarineTraffic.com
  • 9. 9 Example – RF Transponder ● OpenCPN Chart Plotter + AIS Transponder
  • 10. 10 Identified Threats ● Grouped in two macro categories ● 1. Implementation-specific = Online Providers [Software] VS ● 2. Protocol-specific = AIS Transponders [RF / VHF]
  • 11. 11 AIS Application Layer ● AIVDM messages, e.g.: – Position reports – Static reports – Management (channel...) – Safety-related (SART) ● NMEA sentences , as GPS !AIVDM,1,1,,B,177KQJ5000G?tO`K>RA1wUbN0TKH,0*5C TAG, FRAG_#, FRAG_ID, N/A, CHANNEL, PAYLOAD, PAD, CRC
  • 13. 13 Example ● Ship involved in Military Operations ● MMSI 247 320162 (Italy)
  • 14. 14 Spoofing – Online Providers ● Ships or Aids-to-Navigation
  • 15. 15 US to North Korea... What?! ● Wargames (1983) or cyberwar?
  • 16. 16 Programming a malicious route ● Tool to make a ship follow a path over time ● Programmed with Google Earth's KML/KMZ information
  • 18. 18 Example ● “Move” a real ship – Eleanor Gordon
  • 19. 19 Popping Up in Dallas?
  • 21. 21 AIS Communication over the Air ● Protocol designed in a “hardware-epoch” ● Hacking was difficult and cost expensive ● No authentication, no integrity check ● 2014 ● Craft AIS signals? ● Let's do it via software!
  • 22. 22 SDR – Software Defined Radio ● Many applications, e.g. Radio / TV receivers, 20 USD ● Radio amateurs, SDR transmitters ● Reduced costs ● Reduced complexity ● Increased flexibility ● Accessible by many, pirates included!
  • 24. 24 AIS Transmitter ● Built & implemented a software-based AIS transmitter ● GnuRadio, http://gnuradio.org/ ● Custom block: AIS Frame Builder [Ref, HITB KUL 2013]
  • 25. 25 RF Spoofing ● Radio-frequency (VHF) version of spoofing ● Setup : [Attacker] – [Victim] ● Amplifier : 20+ km (modified radio)
  • 27. 27 Injecting into legit AIS gateways
  • 28. 28 Man-in-water Spoofing ● Fake a "man-in-the-water" distress beacon ● Trigger SART (S.O.S.) alerts ● Visually and acoustically ● Lure a victim vessel into navigating to a hostile and attacker-controller sea space ● Mandatory by legislation
  • 30. 30 Frequency Hopping (DoS++) ● Disable AIS transponders ● Switch to non-default frequency (RX and TX) ● Single or multiple target(s) ● Program a desired targeted region – Geographically remote region applies as well ● For example: Pirates can render a ship “invisible” upon entering Somalia
  • 32. 32 CPA Alerting ● Fake a CPA alert, Closest Point of Approach ● Trigger a collision warning alert ● Possibly alter course
  • 35. 35 Slot Starvation (DoS++) ● Impersonate port authority ● Base station spoofing ● Book TDMA slots
  • 36. 36 Slot Starvation (DoS++) ● Base Station Spoofing
  • 37. 37 Slot Starvation (DoS++) ● Victim's Console
  • 38. 38 Timing Attack (DoS++) ● Instruct an AIS transponder to delay its transmission in time ● Default broadcast time: – Static reports = 6 min – Dynamic reports = 0.5 to 3 min (depending on speed) ● Attack code: –
  • 39. 39 Hardware Panic! (DoS) ● Flood the device... Noise on Channel + GPS
  • 40. 40 Back to the r00ts ● AIS = Attack Vector ● AIVDM messages are exchanged and processed at application layer by back-end software – In VTS server installations ● Binary message, special type used for – Crew members, Number of passengers – Environment information ● Malicious payloads, e.g. BOF, SQLi, …
  • 41. 41 Back to the r00ts ● SQL Error in back-end processing
  • 42. 42 Attacking D-GPS ● Differential Global Positioning System (D-GPS) ● Used by port authorities to increase the precision of traditional GPS (meters → centimeters) ● Attack = Spoof D-GPS beacons to force ships into calculating a wrong “GPS position”! ● Message 17: GNSS broadcast binary message
  • 43. 43 Attacking D-GPS ● Similar to “UT Austin Researchers Spoof Superyacht at Sea” – Monday, 29 July 2013
  • 44. 44 Responsible Disclosure ● Experiments conducted without interfering with existing systems – Messages with safety-implications tested only in lab environment (wired connections) ● We reached out the appropriate providers and authorities within time – MarineTraffic, AisHub, VesselFinder, ShipFinder – ITU-R, IALA, IMO, US Coast Guards
  • 45. 45 Proposed countermeasures ● Authentication – Ensure the transmitter is the owner (spoofing) ● Time Check – Avoid replay attack ● Integrity Monitoring – Tamper checking of AIS message (hijacking) ● Validity Check on Data Context – E.g., Geographical information
  • 46. 46 Take Home ● AIS is widely used – Mandatory installation ● AIS is a major technology in marine safety ● AIS is broken at implementation-level ● AIS is broken at protocol-level ● We hope that our work will help in raising the issue and enhancing the existing situation!
  • 47. 47 Thanks! ● Dr. Marco Balduzzi – @embyte ● Alessandro Pasta – @aka_pastus
  • 48. 48 Bonus ;-) ● Real-World Experiment ● Simulate the operational conditions of an attacker at sea ● Coverage experiment ● Target: AIS Gateway Installation ● No time for demo video. Visit me offline