Frank Lee and Gregory Falco (Johns Hopkins University)

Presenter: Frank Lee

End-of-life (EOL) satellites are space assets that have completed their primary mission. Due to their loss in commercial or scientific priority, EOL satellites are often left in place by operators for an extended period, instead of being decommissioned in a timely manner to free up high-value orbits. This period of inactivity exposes EOL satellites to a lower level of operator vigilance, and therefore, higher level of cyberattack risk. With the recent growth in space activities, this paper estimates there will be up to 5,000 inactive satellites in low Earth orbit (LEO) within 5 years, magnifying the space cyber risks and resulting space sustainability challenges. To bolster space cybersecurity, the authors illuminate unique attack vectors against EOL satellites, as well as policy and technical mitigation measures. When part of a constellation, the vulnerability of an EOL satellite has even bigger implications, where a threat actor may use the secondary asset to target primary assets. Ultimately, the active management of EOL satellites is significant for a secure and sustainable LEO infrastructure.

View More Papers

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant...

Ke Sun (University of California San Diego), Chunyu Xia (University of California San Diego), Songlin Xu (University of California San Diego), Xinyu Zhang (University of California San Diego)

Read More

Drone Security and the Mysterious Case of DJI's DroneID

Nico Schiller (Ruhr-Universität Bochum), Merlin Chlosta (CISPA Helmholtz Center for Information Security), Moritz Schloegel (Ruhr-Universität Bochum), Nils Bars (Ruhr University Bochum), Thorsten Eisenhofer (Ruhr University Bochum), Tobias Scharnowski (Ruhr-University Bochum), Felix Domke (Independent), Lea Schönherr (CISPA Helmholtz Center for Information Security), Thorsten Holz (CISPA Helmholtz Center for Information Security)

Read More

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used...

Piyush Kumar Sharma (imec-COSIC, KU Leuven), Devashish Gosain (Max Planck Institute for Informatics), Claudia Diaz (Nym Technologies, SA and imec-COSIC, KU Leuven)

Read More

QPEP in the Real World: A Testbed for Secure...

Julian Huwyler (ETH Zurich), James Pavur (University of Oxford), Giorgio Tresoldi and Martin Strohmeier (Cyber-Defence Campus) Presenter: Martin Strohmeier

Read More