An In-Depth Security Assessment of Maritime Container Terminal Software Systems

被引:13
作者
Eichenhofer, Joseph O. [1 ]
Heymann, Elisa [1 ,2 ]
Miller, Barton P. [1 ]
Kang, Arnold [3 ]
机构
[1] Univ Wisconsin, Comp Sci Dept, Madison, WI 53706 USA
[2] Univ Autonoma Barcelona, Dept Arquitectura Comp & Sistemas Operat, Barcelona 08193, Spain
[3] Total Soft Bank Co, Busan 48002, South Korea
基金
美国国家科学基金会;
关键词
Information and communications technologies (ICT); maritime container terminals; software assurance; software security; software systems; vulnerability assessment;
D O I
10.1109/ACCESS.2020.3008395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks on software systems occur world-wide on a daily basis targeting individuals, corporations, and governments alike. The systems that facilitate maritime shipping are at risk of serious disruptions, and these disruptions can stem from vulnerabilities in the software and processes used in these systems. These vulnerabilities leave such systems open to cyber-attack. Assessments of the security of maritime shipping systems have focused on identifying risks but have not taken the critical (and expensive) next step of actually identifying vulnerabilities present in these systems. While such risk assessments are important, they have not provided the detailed identification of security issues in the systems that control these ports and their terminals. In response, we formed a key collaboration between an experienced academic cybersecurity team and a well-known commercial software provider that manages maritime shipping. We performed an analysis of the information flow involved in the maritime shipping process, and then executed an in-depth vulnerability assessment of the software that manages freight systems. In this paper, we show the flow of information involved in the freight shipping process and explain how we performed the in-depth assessment, summarizing our findings. Like every large software system, maritime shipping systems have vulnerabilities.
引用
收藏
页码:128050 / 128067
页数:18
相关论文
共 36 条
[1]  
Alberts C. J., 2011, OCTAVE METHOD IMPLEM
[2]  
[Anonymous], Common vulnerabilities and exposure
[3]  
[Anonymous], 2011, 270052011 ISOIEC
[4]  
Aylward A., PORT PERFORMANCE FRE
[5]  
Bateman T., 2013, Police warning after drug traffickers cyber-attack (The BBC)
[6]  
Beer I., 2018, PATH EL1 IOS 11
[7]  
Blank R., 2012, Nist special publication 800-30 revision 1 guide for conducting risk assessments
[8]  
CORDIS, 2015, PROJ MIT
[9]  
CORDIS, 2017, SAUR PROJ
[10]  
Downs B., 2017, P MAR SAF SEC COUNC, P64