Roee Idan, Roy Peled, Aviel Ben Siman Tov, Eli Markus, Boris Zadov, Ofir Chodeda, Yohai Fadida (Ben Gurion University of the Negev), Oliver Holschke, Jan Plachy (T-Labs (Research & Innovation)), Yuval Elovici, Asaf Shabtai (Ben Gurion University of the Negev)

The rapid increase in satellite deployment, and particularly nanosatellite deployment, has heightened their exposure to cybersecurity threats, making the task of safeguarding sensitive operations and data challenging. and making the task of safeguarding sensitive operations and data increasingly challenging. To address these challenges, we developed AegisSat, an open-source satellite cybersecurity testbed to study satellite resilience to cyberattacks and test dedicated detection and defense mechanisms, including machine learning-based solutions. Our testbed includes a physical CubeSat (Earth-based) and an environment emulator that mimics realistic orbital conditions such as sunlight, and magnetic fields. We also created a comprehensive dataset consisting of telemetry data and labeled attack data from experiments conducted using different scenarios. The data was collected during hundreds of experiments we performed in the testbed. By making both the design of the testbed and the dataset accessible to the research community, this work advances understanding of satellites’ vulnerability to cyberattacks, drives the development of robust cybersecurity defenses, and establishes a platform for future research.

View More Papers

Delay-allowed Differentially Private Data Stream Release

Xiaochen Li (University of Virginia), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University), Chen Gong (University of Virginia), Shuya Feng (University of Connecticut), Yuan Hong (University of Connecticut), Tianhao Wang (University of Virginia)

Read More

Was This You? Investigating the Design Considerations for Suspicious...

Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li (Georgia Institute of Technology)

Read More

The Power of Words: A Comprehensive Analysis of Rationales...

Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)

Read More

GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization

Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science and Technology), Zhigang Lu (Western Sydney University), Yongbin Zhou (Nanjing University of Science and Technology), Minhui Xue (CSIRO's Data61)

Read More