AbstractThe evolving nature of a malicious and persistent threat is unlike traditional environmental hazards to space flight missions, such as radiation. Consequently, engineering mission systems to be resilient to this new generation of threats may require extending or modifying traditional systems engineering processes and paradigms so as to effectively address the more dynamic behavior and characteristics of the intelligent adversary. This paper steps through a live deployment of a common reconnaissance attack on mission systems that have been deemed “secure” by traditional means, e.g., via compliance to the canonical IT Security Plan. The observations and lessons learned from studying a live attack in a mission context enabled us to ide...
A growing number of adversaries are targeting space missions, and as such, there have been increasin...
The days of “dumb” satellites in LEO are numbered. As many CubeSat missions have proven, commercial ...
ESA is developing, deploying, and operating a wide variety of mission data systems for the command &...
AbstractThe evolving nature of a malicious and persistent threat is unlike traditional environmental...
Artificial Intelligence (AI) is becoming a key technology for space applications. Recently, AI has c...
The connection between space and cyberspace domains is increasingly intertwined. Advancements in spa...
Stronger cyber security is needed in the space domain, since the attack surfaces are widening as the...
As technology and security measures improve, hackers keep looking for new techniques and vulnerabili...
As the complexity of embedded computing platforms continues to grow, small satellites are increasing...
The authors present a novel approach to identifying cyber threats to satellite missions. The methodo...
Modern space systems are increasing in complexity. The advent of the Internet of Space Things, coupl...
Space systems are fundamental components of critical infrastructure, and their loss would profoundly...
Cybersecurity of space systems is an emerging topic, but there is no single dataset that documents c...
In the last 20 years, cyber-attacks to satellite missions increased exponentially, mainly exploiting...
Specialist test establishments have historically placed significant reliance on “security through ob...
A growing number of adversaries are targeting space missions, and as such, there have been increasin...
The days of “dumb” satellites in LEO are numbered. As many CubeSat missions have proven, commercial ...
ESA is developing, deploying, and operating a wide variety of mission data systems for the command &...
AbstractThe evolving nature of a malicious and persistent threat is unlike traditional environmental...
Artificial Intelligence (AI) is becoming a key technology for space applications. Recently, AI has c...
The connection between space and cyberspace domains is increasingly intertwined. Advancements in spa...
Stronger cyber security is needed in the space domain, since the attack surfaces are widening as the...
As technology and security measures improve, hackers keep looking for new techniques and vulnerabili...
As the complexity of embedded computing platforms continues to grow, small satellites are increasing...
The authors present a novel approach to identifying cyber threats to satellite missions. The methodo...
Modern space systems are increasing in complexity. The advent of the Internet of Space Things, coupl...
Space systems are fundamental components of critical infrastructure, and their loss would profoundly...
Cybersecurity of space systems is an emerging topic, but there is no single dataset that documents c...
In the last 20 years, cyber-attacks to satellite missions increased exponentially, mainly exploiting...
Specialist test establishments have historically placed significant reliance on “security through ob...
A growing number of adversaries are targeting space missions, and as such, there have been increasin...
The days of “dumb” satellites in LEO are numbered. As many CubeSat missions have proven, commercial ...
ESA is developing, deploying, and operating a wide variety of mission data systems for the command &...