{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:15:07Z","timestamp":1774368907423,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2664243.2664257","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"436-445","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":137,"title":["A security evaluation of AIS automated identification system"],"prefix":"10.1145","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[{"name":"Trend Micro Research"}]},{"given":"Alessandro","family":"Pasta","sequence":"additional","affiliation":[{"name":"Independent Researcher"}]},{"given":"Kyle","family":"Wilhoit","sequence":"additional","affiliation":[{"name":"Trend Micro Research"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Ambjorn. Seatrack web forecasts and backtracking of oil spills. efficient tool to find illegal spills using ais.  C. Ambjorn. Seatrack web forecasts and backtracking of oil spills. efficient tool to find illegal spills using ais."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Balduzzi. Personal Page. http:\/\/iseclab.org\/people\/embyte\/.  M. Balduzzi. Personal Page. http:\/\/iseclab.org\/people\/embyte\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Bloomberg. Iran Oil Tankers Said by Zanzibar to Signal Wrong Flag. http:\/\/www.bloomberg.com\/news\/2012-10-19\/iranian-oil-tankers-said-by-zanzibar-to-be-signaling-wrong-flag.html.  Bloomberg. Iran Oil Tankers Said by Zanzibar to Signal Wrong Flag. http:\/\/www.bloomberg.com\/news\/2012-10-19\/iranian-oil-tankers-said-by-zanzibar-to-be-signaling-wrong-flag.html."},{"key":"e_1_3_2_1_4_1","unstructured":"C. Carthel S. Coraluppi and P. Grignan. Multisensor tracking and fusion for maritime surveillance.  C. Carthel S. Coraluppi and P. Grignan. Multisensor tracking and fusion for maritime surveillance."},{"key":"e_1_3_2_1_5_1","unstructured":"C.-C. Chen I.-T. Chen C.-M. Cheng M.-Y. Chih and J.-R. Shih. A practical experience with rfid security.  C.-C. Chen I.-T. Chen C.-M. Cheng M.-Y. Chih and J.-R. Shih. A practical experience with rfid security."},{"key":"e_1_3_2_1_6_1","unstructured":"Claudio Guarnieri. Spying on the Seven Seas with AIS.  Claudio Guarnieri. Spying on the Seven Seas with AIS."},{"key":"e_1_3_2_1_7_1","volume-title":"BLACKHAT","author":"Costin A.","year":"2012","unstructured":"A. Costin and A. Francillon . Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices . In BLACKHAT 2012 . A. Costin and A. Francillon. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. In BLACKHAT 2012."},{"key":"e_1_3_2_1_8_1","unstructured":"N. Foster. GnuRadio AIS Receiver. https:\/\/www.cgran.org\/wiki\/AIS.  N. Foster. GnuRadio AIS Receiver. https:\/\/www.cgran.org\/wiki\/AIS."},{"key":"e_1_3_2_1_9_1","volume-title":"Rfc 5280: Internet X. 509 Public Key Infrastructure Certificate and CRL profile","author":"Housley R.","year":"2008","unstructured":"R. Housley , W. Ford , W. Polk , and D. Solo . Rfc 5280: Internet X. 509 Public Key Infrastructure Certificate and CRL profile , 2008 . R. Housley, W. Ford, W. Polk, and D. Solo. Rfc 5280: Internet X. 509 Public Key Infrastructure Certificate and CRL profile, 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"R. S. I.-R. International Telecommunication Union. AIS AIVDM Message Types. http:\/\/www.navcen.uscg.gov\/?pageName=AISMessages.  R. S. I.-R. International Telecommunication Union. AIS AIVDM Message Types. http:\/\/www.navcen.uscg.gov\/?pageName=AISMessages."},{"key":"e_1_3_2_1_11_1","unstructured":"ITU-R. Technical characteristics for an automatic identification system using time-division multiple access in the VHF maritime mobile band. http:\/\/www.itu.int\/dms pubrec\/itu-r\/rec\/m\/R-RECM.1371-4-201004-I!!PDF-E.pdf.  ITU-R. Technical characteristics for an automatic identification system using time-division multiple access in the VHF maritime mobile band. http:\/\/www.itu.int\/dms pubrec\/itu-r\/rec\/m\/R-RECM.1371-4-201004-I!!PDF-E.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.52"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_14_1","unstructured":"X. Ji Z. Shao J. Pan and C. Tang. A New AIS-Based Way to Conduct OLAP of Maritime Traffic Flow.  X. Ji Z. Shao J. Pan and C. Tang. A New AIS-Based Way to Conduct OLAP of Maritime Traffic Flow ."},{"key":"e_1_3_2_1_15_1","volume-title":"A summary of studies on the automation of ship collision avoidance intelligence","author":"LI.","unstructured":"L.-n. LI, S.-h. YANG, B.-g. CAO, and Z.-f. LI. A summary of studies on the automation of ship collision avoidance intelligence . Journal of Jimei University . L.-n. LI, S.-h. YANG, B.-g. CAO, and Z.-f. LI. A summary of studies on the automation of ship collision avoidance intelligence. Journal of Jimei University."},{"key":"e_1_3_2_1_16_1","unstructured":"L. Li-na. Determination of the factors about safe distance of approach and etc on the research of ship automatic avoidance collision.  L. Li-na. Determination of the factors about safe distance of approach and etc on the research of ship automatic avoidance collision."},{"key":"e_1_3_2_1_17_1","unstructured":"B. L. P. Bloomberg Commodities. http:\/\/www.bloomberg.com\/professional\/markets\/commodities\/.  B. L. P. Bloomberg Commodities. http:\/\/www.bloomberg.com\/professional\/markets\/commodities\/."},{"key":"e_1_3_2_1_18_1","unstructured":"K. F. Mathapo. A software-defined radio implementation of maritime AIS. https:\/\/scholar.sun.ac.za\/handle\/10019.1\/2215.  K. F. Mathapo. A software-defined radio implementation of maritime AIS. https:\/\/scholar.sun.ac.za\/handle\/10019.1\/2215."},{"key":"e_1_3_2_1_19_1","unstructured":"Z. Shao C. Tang J. Pan and X. Ji. The application of database techniques in the integrated vessel information service system.  Z. Shao C. Tang J. Pan and X. Ji. The application of database techniques in the integrated vessel information service system."},{"key":"e_1_3_2_1_20_1","unstructured":"D. P. Shepard T. E. Humphreys and A. A. Fansler. Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks.  D. P. Shepard T. E. Humphreys and A. A. Fansler. Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks."},{"key":"e_1_3_2_1_21_1","unstructured":"O.-S. Software. Gnu AIS. http:\/\/gnuais.sourceforge.net\/.  O.-S. Software. Gnu AIS. http:\/\/gnuais.sourceforge.net\/."},{"key":"e_1_3_2_1_22_1","unstructured":"H. Teso. Aircraft Hacking - Practical Aero Series.  H. Teso. Aircraft Hacking - Practical Aero Series."},{"key":"e_1_3_2_1_23_1","unstructured":"B. Tetreault. Use of the automatic identification system (ais) for maritime domain awareness.  B. Tetreault. Use of the automatic identification system (ais) for maritime domain awareness."},{"key":"e_1_3_2_1_24_1","unstructured":"TrendMicro. Security Intelligence Blog. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/category\/internet-of-everything\/.  TrendMicro. Security Intelligence Blog. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/category\/internet-of-everything\/."},{"key":"e_1_3_2_1_25_1","unstructured":"R. Undheim. Ais-Tools. http:\/\/www.funwithelectronics.com\/?id=9.  R. Undheim. Ais-Tools. http:\/\/www.funwithelectronics.com\/?id=9."},{"key":"e_1_3_2_1_26_1","volume-title":"Eavesdropping on gsm:state-of-affairs","author":"van den Broek F.","year":"2011","unstructured":"F. van den Broek . Eavesdropping on gsm:state-of-affairs . 2011 . F. van den Broek. Eavesdropping on gsm:state-of-affairs. 2011."}],"event":{"name":"ACSAC '14: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '14","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 30th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664243.2664257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:01Z","timestamp":1750227121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":26,"alternative-id":["10.1145\/2664243.2664257","10.1145\/2664243"],"URL":"https:\/\/doi.org\/10.1145\/2664243.2664257","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}