Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cybersecurity for Satellites by Jaden Furtado

BreachForce
August 11, 2024
5

Cybersecurity for Satellites by Jaden Furtado

Title: Cybersecurity for Satellites | Securing the last frontier
Presenter: Jaden Furtado
Event: BreachForce CyberSecurity Cohort
Talk Date: 11-August-2024

Key Highlights: Insights into the unique challenges and best practices for securing satellite systems in an increasingly interconnected world.

BreachForce

August 11, 2024
Tweet

Transcript

  1. Who am I? • Researcher @R.U.D.R.A. Cybersecurity Pvt. Ltd. •

    Part time artist and musician • Work with Web, IT, OT, AI/ML, SDRs, etc • Helped secure Government and Private Orgs Trying my best to make the world a safer place :)
  2. You do some research! The objective is to serve as

    an introduction, to get you curious, and not an end-to-end guide!
  3. From a business perspective • 3rd party Hardware components •

    3rd party Software components • The Hardware+Software = Operating System, in this case are satellites
  4. Where are satellite systems in play? • In ships and

    maritime vessels • In planes • In trains • In Finance • In power-plants, factories, hospitals, etc
  5. The User Segment • Very vulnerable!!!! • Easy to access

    and exploit • Hard-coded and Default credentials • High Impact Vulnerabilities are present • Usually results in a complete compromise • Possibility of pivoting to the Control segment
  6. Steps? Step 1: Work out the position of your satellite

    Step 2: Start listening to communications(uplink and downlink) Step 3: Reverse engineer the signal Step 4: Craft your own signal
  7. Step 1: Working out the orbit of a satellite Eccentricity

    (e) — shape of the ellipse, describing how much it is elongated compared to a circle (not marked in diagram). Semi-major axis (a) — half the distance between the apoapsis and periapsis. Inclination (i) — vertical tilt of the ellipse with respect to the reference plane, measured at the ascending node (where the orbit passes upward through the reference plane, the green angle i in the diagram). Longitude of the ascending node (Ω) — horizontally orients the ascending node of the ellipse (where the orbit passes from south to north through the reference plane, symbolized by ☊) Argument of periapsis (ω) : angle measured from the ascending node to the periapsis (the closest point the satellite body comes to the primary body around which it orbits)
  8. Why do these issues occur? • Lack of knowledge •

    Pressure from management • Mistakes • Lack of oversight and regulations
  9. For the engineers Say YES to: • Safety • Testing

    your systems • Sound design and engineering solutions Say NO to: • Hiding functionality/safety issues using software! • “Hacky” solutions • Cutting corners • Unneeded complexity
  10. For the System Integrators • People make mistakes! Ensure redundancy!

    • Understand everything going into your end product! • Audit the software/hardware before using it • Test the end system exhaustively
  11. For the executives • Would you use your own satellites?

    • Work WITH, and NOT AGAINST your engineers • Do NOT Pressurize your engineers to cut corners • Understand risk! • Good for Business != Good Engineering
  12. Your options… • Partner with academia (IIT Kanpur C3i Labs,

    Trust Labs IIT Bombay, IIT Madras, Confluence Labs BITS Pilani) • Partner with a cybersecurity research company • Partner with government agencies (ISRO, NCIIPC, CERT-India, MeiTY, RAW, etc) • Do it independently
  13. Main takeaway from this talk… • OWASP Top 10 •

    Lack of encryption • Hardcoded passwords
  14. References • Satellite-Based Communications Security: A Survey of Threats, Solutions,

    and Research Challenges • https://act-on.ioactive.com/acton/attachment/34793/f-42451503-f44b-45a6-b5 e2-2ec8603db3c1/1/-/-/-/-/IOActive%20-%20Last%20Call%20For%20Satcom %20Security%20-%20Santamarta.pdf • GNU Radio Wiki • Contact of Containership Dali with the Francis Scott Key Bridge and Subsequent Bridge Collapse
  15. What is an IQ data file? • Signal data is

    stored in the form of IQIQIQIQIQIQ where I+jQ • “In-phase" and "Quadrature" • Raw signal data • Equivalent to A*sin(wt+alpha) • Sufficient to plot the current position of a wave in time
  16. What inference can we draw from this? A wave is

    a function of • Frequency • Amplitude • Phase * • Time Wave = W(f,A,p,t) + c, where c is a damping factor We cannot control time!!!!!!!!!!!!
  17. Sampling theorem If a continuous time signal contains no frequency

    components higher than W hz, then it can be completely determined by uniform samples taken at a rate f samples per second where f≥2W or, in term of the sampling period T≤1/2W
  18. Interpolation • Given a sample, add M-1 samples between this

    and the next • Increase wave resolution