Treffer: Analysis of Security Vulnerabilities in S-100-Based Maritime Navigation Software.

Title:
Analysis of Security Vulnerabilities in S-100-Based Maritime Navigation Software.
Authors:
Cho, Hoyeon1,2 (AUTHOR), Lee, Changui2,3 (AUTHOR), Lee, Seojeong3 (AUTHOR) sjlee@kmou.ac.kr
Source:
Sensors (14248220). Feb2026, Vol. 26 Issue 4, p1246. 29p.
Database:
Academic Search Index

Weitere Informationen

The S-100 standard for Electronic Chart Display and Information Systems (ECDIS) uses Lua scripts to render electronic charts, yet lacks security specifications for script execution. This paper evaluates automated Static Application Security Testing (SAST) tools versus expert manual review for S-100-compliant software. Four SAST tools were applied alongside an expert review of OpenS100, a reference implementation for next-generation ECDIS. While automated tools identified numerous defects, they failed to detect 83% (19/23) of expert-identified vulnerabilities, including an unrestricted Lua interpreter flaw with a Common Vulnerability Scoring System (CVSS) score of 9.3. This vulnerability enables Remote Code Execution (RCE) via malicious portrayal catalogues, verified through Proof of Concept (PoC) development. The analysis demonstrates that SAST tools are constrained by limited maritime domain knowledge and challenges in analyzing cross-language semantic risks at the C++–Lua interface. The findings establish that identified vulnerabilities stem from specification gaps in the S-100 standard rather than isolated coding errors. These results indicate that functional safety certifications require supplementation to address design-level security risks. The evidence supports that the International Hydrographic Organization (IHO) incorporate security controls, such as script sandboxing and library restrictions, into the S-100 framework before the 2029 mandatory adoption deadline. [ABSTRACT FROM AUTHOR]