Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cybersecurity for Satellites by Jaden Furtado

Avatar for BreachForce BreachForce
August 11, 2024
19

Cybersecurity for Satellites by Jaden Furtado

Title: Cybersecurity for Satellites | Securing the last frontier
Presenter: Jaden Furtado
Event: BreachForce CyberSecurity Cohort
Talk Date: 11-August-2024

Key Highlights: Insights into the unique challenges and best practices for securing satellite systems in an increasingly interconnected world.

Avatar for BreachForce

BreachForce

August 11, 2024
Tweet

More Decks by BreachForce

Transcript

  1. Who am I? • Researcher @R.U.D.R.A. Cybersecurity Pvt. Ltd. •

    Part time artist and musician • Work with Web, IT, OT, AI/ML, SDRs, etc • Helped secure Government and Private Orgs Trying my best to make the world a safer place :)
  2. You do some research! The objective is to serve as

    an introduction, to get you curious, and not an end-to-end guide!
  3. From a business perspective • 3rd party Hardware components •

    3rd party Software components • The Hardware+Software = Operating System, in this case are satellites
  4. Where are satellite systems in play? • In ships and

    maritime vessels • In planes • In trains • In Finance • In power-plants, factories, hospitals, etc
  5. The User Segment • Very vulnerable!!!! • Easy to access

    and exploit • Hard-coded and Default credentials • High Impact Vulnerabilities are present • Usually results in a complete compromise • Possibility of pivoting to the Control segment
  6. Steps? Step 1: Work out the position of your satellite

    Step 2: Start listening to communications(uplink and downlink) Step 3: Reverse engineer the signal Step 4: Craft your own signal
  7. Step 1: Working out the orbit of a satellite Eccentricity

    (e) — shape of the ellipse, describing how much it is elongated compared to a circle (not marked in diagram). Semi-major axis (a) — half the distance between the apoapsis and periapsis. Inclination (i) — vertical tilt of the ellipse with respect to the reference plane, measured at the ascending node (where the orbit passes upward through the reference plane, the green angle i in the diagram). Longitude of the ascending node (Ω) — horizontally orients the ascending node of the ellipse (where the orbit passes from south to north through the reference plane, symbolized by ☊) Argument of periapsis (ω) : angle measured from the ascending node to the periapsis (the closest point the satellite body comes to the primary body around which it orbits)
  8. Why do these issues occur? • Lack of knowledge •

    Pressure from management • Mistakes • Lack of oversight and regulations
  9. For the engineers Say YES to: • Safety • Testing

    your systems • Sound design and engineering solutions Say NO to: • Hiding functionality/safety issues using software! • “Hacky” solutions • Cutting corners • Unneeded complexity
  10. For the System Integrators • People make mistakes! Ensure redundancy!

    • Understand everything going into your end product! • Audit the software/hardware before using it • Test the end system exhaustively
  11. For the executives • Would you use your own satellites?

    • Work WITH, and NOT AGAINST your engineers • Do NOT Pressurize your engineers to cut corners • Understand risk! • Good for Business != Good Engineering
  12. Your options… • Partner with academia (IIT Kanpur C3i Labs,

    Trust Labs IIT Bombay, IIT Madras, Confluence Labs BITS Pilani) • Partner with a cybersecurity research company • Partner with government agencies (ISRO, NCIIPC, CERT-India, MeiTY, RAW, etc) • Do it independently
  13. Main takeaway from this talk… • OWASP Top 10 •

    Lack of encryption • Hardcoded passwords
  14. References • Satellite-Based Communications Security: A Survey of Threats, Solutions,

    and Research Challenges • https://act-on.ioactive.com/acton/attachment/34793/f-42451503-f44b-45a6-b5 e2-2ec8603db3c1/1/-/-/-/-/IOActive%20-%20Last%20Call%20For%20Satcom %20Security%20-%20Santamarta.pdf • GNU Radio Wiki • Contact of Containership Dali with the Francis Scott Key Bridge and Subsequent Bridge Collapse
  15. What is an IQ data file? • Signal data is

    stored in the form of IQIQIQIQIQIQ where I+jQ • “In-phase" and "Quadrature" • Raw signal data • Equivalent to A*sin(wt+alpha) • Sufficient to plot the current position of a wave in time
  16. What inference can we draw from this? A wave is

    a function of • Frequency • Amplitude • Phase * • Time Wave = W(f,A,p,t) + c, where c is a damping factor We cannot control time!!!!!!!!!!!!
  17. Sampling theorem If a continuous time signal contains no frequency

    components higher than W hz, then it can be completely determined by uniform samples taken at a rate f samples per second where f≥2W or, in term of the sampling period T≤1/2W
  18. Interpolation • Given a sample, add M-1 samples between this

    and the next • Increase wave resolution