Investigating the Security and Accessibility of Voyage Data Recorder Data using a USB attack

Research output: Contribution to conferenceConference paper (not formally published)peer-review

12 Downloads (Pure)

Abstract

Voyage Data Recorders (VDR) or 'black boxes' for ships hold critical navigational and sensor data that can be used as evidence in an investigation. These systems have proven extremely useful in determining the cause of several previous shipping accidents. Considering the importance of the VDR and the increasing number of cyber-attacks in the maritime sector, the likelihood of it being attacked is high. This paper examines the security and accessibility of VDR data through a malicious USB device. A USB device is used after a series of tests, detailed in this paper, found it to be a viable way to compromise a VDR system. Intensive penetration testing was performed on a VDR, and this paper presents the four key highlights from the authors’ tests. The results show that realworld VDR data might not be secure from an insider threat with little to no cyber knowledge, and future VDRs may open that up to more outsider attackers. For a device like VDR, where confidentiality, integrity and availability of data are critical, a cyber-attack could therefore lead to serious repercussions.
Original languageEnglish
Number of pages0
Publication statusPublished - 2023
EventCYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems -
Duration: 13 Nov 202217 Nov 2022

Conference

ConferenceCYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
Period13/11/2217/11/22

Fingerprint

Dive into the research topics of 'Investigating the Security and Accessibility of Voyage Data Recorder Data using a USB attack'. Together they form a unique fingerprint.

Cite this