Jessie Hamill-Stewart (University of Bristol and University of Bath), Awais Rashid (University of Bristol)

Satellite services are vital for many types of critical infrastructure, including electricity, finance and transportation. Sophisticated attackers therefore may target satellites, in order to create widespread disruption. The ground infrastructure of satellite systems offers attackers direct access to satellite systems, as this is where satellites are operated and monitored. We investigate the tactics and technology utilised by attackers of satellite ground systems, through analysis of previous attacks conducted against satellite ground infrastructure. Through this investigation, we contribute to growing literature surrounding cyber attacks against satellite systems, by providing empirical analysis of techniques and tactics used to attack ground infrastructure. Analysis of attack cases is presented, and then we discuss key findings and implications for future research.

View More Papers

Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware...

Zicong Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing), Chao Zhang (Tsinghua University), Hangtian Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Wenhou Sun (Tsinghua University), Zhizhuo Tang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Liehui Jiang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianjun Chen (Tsinghua…

Read More

IDA: Hybrid Attestation with Support for Interrupts and TOCTOU

Fatemeh Arkannezhad (UCLA), Justin Feng (UCLA), Nader Sehatbakhsh (UCLA)

Read More

Unus pro omnibus: Multi-Client Searchable Encryption via Access Control

Jiafan Wang (Data61, CSIRO), Sherman S. M. Chow (The Chinese University of Hong Kong)

Read More

Understanding the Implementation and Security Implications of Protective DNS...

Mingxuan Liu (Zhongguancun Laboratory; Tsinghua University), Yiming Zhang (Tsinghua University), Xiang Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University), Haixin Duan (Tsinghua University; Zhongguancun Laboratory), Xiaofeng Zheng (Institute for Network Sciences and Cyberspace, Tsinghua University; QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.)

Read More