Rachel McAmis (MIT Lincoln Laboratory and University of Washington), Connor Willison (MIT Lincoln Laboratory), Richard Skowyra (MIT Lincoln Laboratory), Samuel Mergendahl (MIT Lincoln Laboratory)

Satellite systems enable many capabilities for their users, such as high-speed, low-latency communications, weather forecasting, geographic imaging, and defense applications. As customers increase their reliance on this critical infrastructure, the risk of attack only increases, particularly from highly-resourced adversaries. However, in this work, we demonstrate that common existing space system software platforms are poorly equipped to handle malicious satellite peripherals. Using NASA’s popular open source core Flight System software (cFS), we show that with current satellite software and industry-standard reliability techniques, a system designer will inevitably confront a dilemma: Either the system deploys countermeasures against malicious components and suffers degraded nominal performance, or the system cannot survive malicious components. We conclude by proposing challenges and considerations towards resolving this dilemma.

View More Papers

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in...

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

Read More

Towards LLM-Resistant Software Protection: Agent Failure Patterns in CTF...

Ryutaro Nishizaka, Yudai Fujiwara, Takuya Shimizu, Kazushi Kato, Yuichi Sugiyama (Ricerca Security, Inc.)

Read More

From Noise to Signal: Precisely Identify Affected Packages of...

Yingyuan Pu (QI-ANXIN Technology Research Institute), Lingyun Ying (QI-ANXIN Technology Research Institute), Yacong Gu (Tsinghua University, Tsinghua University-QI-ANXIN Group JCNS)

Read More