{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T16:50:46Z","timestamp":1777135846665,"version":"3.51.4"},"reference-count":140,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":170,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>As the space industry approaches a period of rapid change, securing both emerging and legacy satellite missions will become vital. However, space technology has been largely overlooked by the systems security community. This survey seeks to understand why this is the case and to offer a starting point for technical security researchers seeking impactful contributions beyond the Earth\u2019s mesosphere. The paper begins with a cross-disciplinary synthesis of relevant threat models from a diverse array of fields, ranging from legal and policy studies to aerospace engineering. This is presented as a \u201cthreat matrix toolbox,\u201d which security researchers may leverage to motivate technical research into given attack vectors and defenses. We derive this model from an original chronology of &amp;gt; 100 significant satellite hacking incidents spanning the previous 60\u00a0years. Together, these are used to assess the state-of-the-art in satellite security across four sub-domains: satellite radio-link security, space hardware security, ground station security, and operational\/mission security. In each area, we note significant findings and unresolved questions which the systems security community is aptly poised to tackle. By consolidating this research, we present the case that satellite systems security researchers can build on strong, but disparate, academic foundations and rise to meet an urgent need for future space missions.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac008","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T12:00:02Z","timestamp":1655726402000},"source":"Crossref","is-referenced-by-count":41,"title":["Building a launchpad for satellite cyber-security research: lessons from 60\u00a0years of spaceflight"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3632-9126","authenticated-orcid":false,"given":"James","family":"Pavur","sequence":"first","affiliation":[{"name":"Department of Computer Science, Oxford University , 15 Parks Road, OX1 3QD Oxford, UK"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Oxford University , 15 Parks Road, OX1 3QD Oxford, UK"}]}],"member":"286","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"2023052911513847600_bib1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10207-020-00503-w","article-title":"Cyber security in new space","volume":"20","author":"Manulis","year":"2020","journal-title":"Int J Inf Secur"},{"key":"2023052911513847600_bib2","first-page":"5906","article-title":"Satellite hacking: a guide for the perplexed","volume":"10","author":"Fritz","year":"2013","journal-title":"Cult Mandala"},{"key":"2023052911513847600_bib3","author":"Union of Concerned Scientists, UCS Satellite Database","year":"2018"},{"key":"2023052911513847600_bib4","author":"Livingstone","year":"2016","journal-title":"Space, the Final Frontier for Cybersecurity?"},{"key":"2023052911513847600_bib5","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1016\/B978-0-12-394397-2.00068-4","article-title":"Satellite cyber attack search and destroy","volume-title":"Computer and Information Security Handbook","author":"Bardin","year":"2013","edition":"2"},{"key":"2023052911513847600_bib6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1257\/jep.32.2.173","article-title":"Space, the final economic frontier","volume":"32","author":"Weinzierl","year":"2018","journal-title":"J Econ Perspec"},{"key":"2023052911513847600_bib7","author":"Tartar","year":"2018","journal-title":"Which Rockets Are Winning the Race to Make Space Affordable?"},{"key":"2023052911513847600_bib8","article-title":"The recent large reduction in space launch cost","volume-title":"Procedings of the Forty-eightth International Conference on Environmental Systems","author":"Jones","year":"2018"},{"key":"2023052911513847600_bib9","author":"Interorbital, Interorbital Storefront"},{"key":"2023052911513847600_bib10","article-title":"Space dependence - a critical vulnerability of the net-centric operational commander","author":"Grant ME","year":"2005"},{"key":"2023052911513847600_bib11","first-page":"103","article-title":"What happens if they say no? Preserving access to critical commercial space capabilities during future crises","volume":"28","author":"Lungerman","year":"2014","journal-title":"Air Space Power J"},{"key":"2023052911513847600_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.23919\/CYCON.2019.8756904","article-title":"The cyber-ASAT: on the impact of cyber weapons in outer space","volume-title":"Proceedings of the 2019 Eleventh International Conference on Cyber Conflict (CyCon), vol. 900 Tallinn","author":"Pavur","year":"2019"},{"key":"2023052911513847600_bib13","doi-asserted-by":"crossref","DOI":"10.2514\/6.2018-5275","article-title":"The vacuum of space cyber security","volume-title":"Proceedings of the 2018 AIAA SPACE and Astronautics Forum and Exposition","author":"Falco","year":"2018"},{"key":"2023052911513847600_bib14","article-title":"Space threat assessment 2018","author":"Harrison","year":"2018"},{"key":"2023052911513847600_bib15","article-title":"Security threats against space missions","author":"CCSDS","year":"2015"},{"key":"2023052911513847600_bib16","article-title":"Cybersecurity and the new era of space activities","author":"Fidler","year":"2018"},{"key":"2023052911513847600_bib17","article-title":"High-assurance cyber space systems for small satellite mission integrity","author":"Lane","year":"2017"},{"key":"2023052911513847600_bib18","article-title":"Towards a cybersecurity policy for a sustainable, secure and safe space environment","author":"del\u00a0Monte","year":"2013"},{"key":"2023052911513847600_bib19","doi-asserted-by":"crossref","DOI":"10.1145\/3317549.3323418","article-title":"Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband","volume-title":"Proceedings of the Twelvth Conference on Security and Privacy in Wireless and Mobile Networks","author":"Pavur","year":"2019"},{"key":"2023052911513847600_bib20","doi-asserted-by":"crossref","DOI":"10.2514\/6.2013-5401","article-title":"Cyber operations to defend space systems?","volume-title":"Proceedings of the AIAA SPACE 2013 Conference and Exposition","author":"Rendleman","year":"2013"},{"key":"2023052911513847600_bib21","first-page":"75","article-title":"On the requirements for successful GPS spoofing attacks","volume-title":"Proceedings of the Eighteenth ACM Conference on Computer and Communications Security CCS \u201911","author":"Tippenhauer","year":"2011"},{"key":"2023052911513847600_bib22","doi-asserted-by":"crossref","DOI":"10.2514\/6.2021-4241","article-title":"A security risk taxonomy for commercial space missions","author":"Falco","year":"2021","journal-title":"Proceedings of the conference of ASCEND 2021"},{"key":"2023052911513847600_bib23","author":"Bailey","year":"2020","journal-title":"Establishing Space Cybersecurity Policy, Standards, and Risk Management Practices"},{"key":"2023052911513847600_bib24","doi-asserted-by":"crossref","DOI":"10.2514\/6.2016-5231","article-title":"Spacecraft embedded cyber defense - prototypes and experimentation","volume-title":"Proceedings of the AIAA SPACE Forum 2016 AIAA SPACE Forum","author":"Cohen","year":"2016"},{"key":"2023052911513847600_bib25","article-title":"A survey of satellite communications system vulnerabilities","author":"Steinberger","year":"2008"},{"key":"2023052911513847600_bib26","article-title":"Cybersecurity management and oversight at the jet propulsion laboratory","author":"NASA Office of the Inspector General","year":"2019"},{"key":"2023052911513847600_bib27","author":"Elgin","year":"2008","journal-title":"Network Security Breaches Plague NASA"},{"key":"2023052911513847600_bib28","first-page":"3","article-title":"The protection of space missions: threats and cyber threats","volume-title":"Proceedings of the International Conference on Information Systems Security Lecture Notes in Computer Science","author":"Zatti","year":"2017"},{"key":"2023052911513847600_bib29","doi-asserted-by":"crossref","DOI":"10.2514\/6.2017-5305","article-title":"Cyber resilient flight software for spacecraft","volume-title":"Proceedings of the AIAA SPACE and Astronautics Forum and Exposition","author":"Wheeler","year":"2017"},{"key":"2023052911513847600_bib30","author":"Courier Mail","year":"2006","journal-title":"China Targets US Satellite"},{"key":"2023052911513847600_bib31","author":"AFP","year":"1999","journal-title":"Moscow Admits Satellite Phone Jamming"},{"key":"2023052911513847600_bib32","doi-asserted-by":"crossref","DOI":"10.1109\/SP40000.2020.00056","article-title":"A tale of sea and sky: on the security of maritime VSAT communications","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P)","author":"Pavur","year":"2020"},{"key":"2023052911513847600_bib33","author":"David","year":"2020","journal-title":"How Amateur Satellite Trackers Are Keeping an \u2019eye\u2019 on Objects around the Earth"},{"key":"2023052911513847600_bib34","volume-title":"Hamas \u201dHacks into\u201d Satellite Transmission of Israeli Channel 10 TV","author":"BBC Monitoring World Media","year":"2014"},{"key":"2023052911513847600_bib35","author":"Francis","year":"2008","journal-title":"Computer Virus Infects Orbiting Space Station"},{"key":"2023052911513847600_bib36","volume-title":"NASA Cybersecurity: An Examination of the Agency\u2019s Information Security estimony before the Subcommittee on Investigations and Oversight, House Committee on Science, Space, and Technology","author":"Martin","year":"2012"},{"key":"2023052911513847600_bib37","author":"Winder","year":"2019","journal-title":"Confirmed: NASA Has Been Hacked"},{"key":"2023052911513847600_bib38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/AERO.2016.7500812","article-title":"Lessons learned from applying cyber risk management and survivability concepts to a space mission","volume-title":"Proceedings of the 2016 IEEE Aerospace Conference","author":"Knez","year":"2016"},{"key":"2023052911513847600_bib39","first-page":"86","article-title":"Commercial satellites, critical information infrastructure protection, and preventing today\u2019s threat actors from becoming tomorrow\u2019s Captain Midnight","volume":"48","author":"Young","year":"2017","journal-title":"Strat Cyber Defense Multidisc Perspec"},{"key":"2023052911513847600_bib40","article-title":"Cyber security awareness for SmallSat ground networks","author":"Vera","year":"2016","journal-title":"Proceedings of the AIAA\/USU Conference on Small Satellites"},{"key":"2023052911513847600_bib41","first-page":"2481","article-title":"Cyber situational awareness in space organizations operations centres","volume-title":"Proceedings of the AIAA SpaceOps Conference","author":"Vivero","year":"2018"},{"key":"2023052911513847600_bib42","article-title":"Cybersecurity risk management and best practices. Working group 4: final report","author":"Communications Security, Reliability and Interoperability Council","year":"2015"},{"key":"2023052911513847600_bib43","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.procs.2014.03.064","article-title":"Cyber defense of space-based assets: verifying and validating defensive designs and implementations","volume":"28","author":"Byrne","year":"2014","journal-title":"Proc Comput Sci"},{"key":"2023052911513847600_bib44","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/CCST.2006.313451","article-title":"On-board encryption in Earth observation small satellites","volume-title":"Proceedings of the Fortieth Annual 2006 International Carnahan Conference on Security Technology","author":"Banu","year":"2006"},{"key":"2023052911513847600_bib45","author":"New York Times","year":"1962","journal-title":"Radio Satellites Open to Jamming"},{"key":"2023052911513847600_bib46","first-page":"1","volume-title":"Soviets Ask Controls on Satellite TV","author":"Washington Post","year":"1972"},{"key":"2023052911513847600_bib47","author":"Davis","year":"1986","journal-title":"Captain Midnight Unmasked by FCC, Enters Guilty Plea"},{"key":"2023052911513847600_bib48","first-page":"1","author":"Pollack","year":"1986","journal-title":"Technology: Barring Jams of Satellite TV"},{"key":"2023052911513847600_bib49","article-title":"Appeal from the United States District Court for the Eastern District of Virginia, at Norfolk","author":"Smith","year":"1991"},{"key":"2023052911513847600_bib50","first-page":"8","volume-title":"Space Piracy","author":"Times of India","year":"1986"},{"key":"2023052911513847600_bib51","first-page":"1","volume-title":"Youths Hacked into Secret Nasa Network","author":"Parry","year":"1987"},{"key":"2023052911513847600_bib52","doi-asserted-by":"crossref","DOI":"10.5040\/9798400686009","volume-title":"Military Space Power: A Guide to the Issues","author":"Wong","year":"2010"},{"key":"2023052911513847600_bib53","volume-title":"Hackers Target BskyB Channels","author":"Hellen","year":"1993"},{"key":"2023052911513847600_bib54","volume-title":"Cable TV \u2019Pirate\u2019 Faces Sentencing; Prosecutors Hope to Send Signal Of Toughness on High-Tech Crime","author":"Walsh","year":"1994"},{"key":"2023052911513847600_bib55","author":"Associated Press","year":"2002","journal-title":"Falun Gong Hijacks Chinese TV"},{"key":"2023052911513847600_bib56","author":"South China Morning Post","year":"2003","journal-title":"Falun Gong Accused of Pirate Broadcast"},{"key":"2023052911513847600_bib57","author":"Xinhua","year":"2004","journal-title":"AsiaSat Accuses Falungong of Intercepting Satellite Signal"},{"key":"2023052911513847600_bib58","author":"Daly","year":"2007","journal-title":"LTTE: Technologically Innovative Rebels"},{"key":"2023052911513847600_bib59","author":"Gorman","year":"2009","journal-title":"Insurgents Hack U.S. Drones"},{"key":"2023052911513847600_bib60","author":"Arthur","year":"2011","journal-title":"Chinese Hackers Suspected of Interfering with US Satellites"},{"key":"2023052911513847600_bib61","author":"Gibbs","year":"2013","journal-title":"International Space Station Attacked by \u2018Virus Epidemics'"},{"key":"2023052911513847600_bib62","author":"Zissis","year":"2007","journal-title":"China\u2019s Anti-Satellite Test"},{"key":"2023052911513847600_bib63","author":"BBC Monitoring World Media","year":"2009","journal-title":"UK-Based Al-Hiwar Satellite TV off-Air after \u2019Deliberate Jamming\u2019"},{"key":"2023052911513847600_bib64","volume-title":"EU Pressures Iran to End Jamming","author":"BBC","year":"2010"},{"key":"2023052911513847600_bib65","volume-title":"Jamming of Al-Jazeera TV Broadcasts Traced to Jordan; Experts Comment","author":"BBC Monitoring Middle East","year":"2010"},{"key":"2023052911513847600_bib66","author":"Messieh","year":"2011","journal-title":"Bahrain Satellite Channel Jammed, Launches on Livestation Instead"},{"key":"2023052911513847600_bib67","author":"ECADF","year":"2011","journal-title":"China Accused of Jamming TV, Websites in Ethiopia \u2013 COMPUTERWORLD Reported"},{"key":"2023052911513847600_bib68","author":"Thuraya Press Office","year":"2011","journal-title":"Thuraya Telecom Services Affected by Intentional Jamming in Libya"},{"key":"2023052911513847600_bib69","author":"BBC Monitoring World Media","year":"2011","journal-title":"Iran\u2019s Arabic TV Said \u201dJammed from Saudi Arabia\u201d"},{"key":"2023052911513847600_bib70","author":"Leo Les H\u00e9ros Ordinaires","year":"2013"},{"key":"2023052911513847600_bib71","author":"Richardson","year":"2012","journal-title":"Eritrea Accuses Ethiopia of Blocking Satellite Transmissions"},{"key":"2023052911513847600_bib72","volume-title":"World Broadcasters Condemn Satellite Jamming \u201dEmanating from Syria\u201d","author":"BBC Monitoring World Media","year":"2012"},{"key":"2023052911513847600_bib73","volume-title":"Azeri Editor Says Authorities to Lose despite Jamming Satellite Signals","author":"BBC Monitoring Trans Caucasus Unit","year":"2013"},{"key":"2023052911513847600_bib74","volume-title":"Syrian TV Still Jammed, Minister Says Channel Back on Air","author":"BBC Monitoring Middle East","year":"2018"},{"key":"2023052911513847600_bib75","volume-title":"When Hamas Comes into Your Living Room","author":"Housen-Couriel","year":"2016"},{"key":"2023052911513847600_bib76","author":"Egea","year":"2010","journal-title":"Playing in a Satellite Environment 1.2"},{"key":"2023052911513847600_bib77","author":"Moore","year":"2015","journal-title":"Spread Spectrum Satcom Hacking: Attacking The Globstar Simplex Data Service"},{"key":"2023052911513847600_bib78","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/SP.2012.18","article-title":"Don\u2019t trust satellite phones: a security analysis of two satphone standards","volume-title":"Proceedings of the 2012 IEEE Symposium on Security and Privacy","author":"Driessen","year":"2012"},{"key":"2023052911513847600_bib79","doi-asserted-by":"crossref","first-page":"032113","DOI":"10.1007\/s11432-017-9230-8","article-title":"A real-time inversion attack on the GMR-2 cipher used in the satellite phones","volume":"61","author":"Hu","year":"2018","journal-title":"Sci Chin Inf Sci"},{"key":"2023052911513847600_bib80","author":"Forester","year":"2015","journal-title":"Russia \u201dEavesdropping\u201d on Satellite Operations"},{"key":"2023052911513847600_bib81","author":"Symantec","year":"2017","journal-title":"Thrip: Espionage Group Hits Satellite, Telecoms, and Defense Companies"},{"key":"2023052911513847600_bib82","author":"Flaherty","year":"2014","journal-title":"Chinese Hack U.S. Weather Systems, Satellite Network"},{"key":"2023052911513847600_bib83","author":"Newman","year":"2014","journal-title":"Report: Another Chinese Military Unit Has Been Hacking U.S. Systems-This Time Satellite Networks"},{"key":"2023052911513847600_bib84","author":"BBC","year":"2012","journal-title":"Hackers Controlled Nasa Computers"},{"key":"2023052911513847600_bib85","article-title":"Expedited efforts needed to remediate high-risk vulnerabilities in JPSS ground system","author":"Crawley","year":"2014"},{"key":"2023052911513847600_bib86","author":"Santamarta","year":"2018","journal-title":"Last Call for SATCOM Security"},{"key":"2023052911513847600_bib87","author":"Santamarta","year":"2014","journal-title":"SATCOM Terminals: Hacking by Air, Sea, and Land"},{"key":"2023052911513847600_bib88","author":"Tanase","year":"2015","journal-title":"Satellite Turla: APT Command and Control in the Sky"},{"key":"2023052911513847600_bib89","author":"Pavur","year":"2020","journal-title":"Whispers Among the Stars"},{"key":"2023052911513847600_bib90","article-title":"Hackasat","author":"Defense Digital Service","year":"2020"},{"key":"2023052911513847600_bib91","author":"AeroSpace Village","year":"2020","journal-title":"Securing the Skies and Beyond"},{"key":"2023052911513847600_bib92","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/IWSSC.2006.255980","article-title":"Frequency-hopping techniques for secure satellite TT+C: system analysis + trade-offs","volume-title":"Proceedings of the 2006 International Workshop on Satellite and Space Communications Madrid","author":"Simone","year":"2006"},{"key":"2023052911513847600_bib93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MilCIS.2018.8574109","article-title":"Anomaly detection in satellite communications systems using LSTM networks","volume-title":"Proceedings of the2018 Military Communications and Information Systems Conference (MilCIS) Canberra, ACT","author":"Gunn","year":"2018"},{"key":"2023052911513847600_bib94","doi-asserted-by":"crossref","DOI":"10.7249\/PE273","article-title":"Sigint for anyone: the growing availability of signals intelligence in the public domain","author":"Weinbaum","year":"2017"},{"key":"2023052911513847600_bib95","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2005.1561945","article-title":"Security issues in hybrid networks with a satellite component","volume":"12","author":"Roy-Chowdhury","year":"2005","journal-title":"IEEE Wireless Commun"},{"key":"2023052911513847600_bib96","article-title":"QPEP: a QUIC-based approach to encrypted performance enhancing proxies for high-latency satellite broadband","author":"Pavur","year":"2020","journal-title":"Proceedings of the Network and Distributed System Security Symposium 2021 Internet Society"},{"key":"2023052911513847600_bib97","doi-asserted-by":"crossref","article-title":"Satellite-based communications security: a survey of threats, solutions, and research challenges","author":"Tedeschi","DOI":"10.1016\/j.comnet.2022.109246"},{"key":"2023052911513847600_bib98","first-page":"577","article-title":"Fault attack on the DVB common scrambling algorithm","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005 Lecture Notes in Computer Science","author":"Wirt","year":"2005"},{"key":"2023052911513847600_bib99","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/ISDPE.2007.63","article-title":"Security analysis of DVB common scrambling algorithm","volume-title":"The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007)","author":"Li","year":"2007"},{"key":"2023052911513847600_bib100","first-page":"45","article-title":"Breaking DVB-CSA","volume-title":"Research in Cryptology Lecture Notes in Computer Science","author":"Tews","year":"2011"},{"key":"2023052911513847600_bib101","article-title":"PowerVu management keys hacked","author":"Colibri","year":"2014"},{"key":"2023052911513847600_bib102","first-page":"153","article-title":"Countermeasures for attacks on satellite TV cards using open receivers","volume-title":"Proceedings of the Third Australasian Information Security Workshop (AISW2005)","author":"Francis","year":"2005"},{"key":"2023052911513847600_bib103","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/JSAC.2003.819978","article-title":"Dynamics of key management in secure satellite multicast","volume":"22","author":"Howarth","year":"2004","journal-title":"IEEE J Select Areas Commun"},{"key":"2023052911513847600_bib104","first-page":"1093","article-title":"Security architecture for satellite services over cryptographically heterogeneous networks","volume-title":"Proceedings of the 2011 Sixth International ICST Conference on Communications and Networking in China (CHINACOM) Institute for Computer Sciences","author":"Sheng","year":"2011"},{"key":"2023052911513847600_bib105","first-page":"191","article-title":"Quantum cryptography for secure satellite communications","volume-title":"Proceedings of the 2000 IEEE Aerospace Conference","author":"Hughes","year":"2000"},{"key":"2023052911513847600_bib106","article-title":"SES Announces 10 Project Partners in QUARTZ Satellite Cybersecurity Consortium","author":"SES","year":"2018"},{"key":"2023052911513847600_bib107","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1023\/A:1014561823985","article-title":"Satellite \u2013 a new opportunity for broadband applications","volume":"20","author":"Fidler","year":"2002","journal-title":"BT Technol J"},{"key":"2023052911513847600_bib108","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISTMWC.2007.4299224","article-title":"Security requirements for IP over satellite DVB networks","volume-title":"Proceedings of the 2007 Sixteenth IST Mobile and Wireless Communications Summit IEEE","author":"Iyengar","year":"2007"},{"key":"2023052911513847600_bib109","doi-asserted-by":"crossref","DOI":"10.2514\/6.2004-3177","article-title":"SatiPSec : an optimized solution for securing multicast and unicast satellite Transmissions","volume-title":"Proceedings of the 22nd AIAA International Communications Satellite Systems Conference & Exhibit 2004 (ICSSC)","author":"Duquerroy","year":"2004"},{"key":"2023052911513847600_bib110","author":"Pavur","year":"2020","journal-title":"Whispers Among the Stars: A Practical Look at Perpetrating (and Preventing) Satellite Eavesdropping Attacks"},{"key":"2023052911513847600_bib111","author":"CCSDS","year":"2018","journal-title":"Space Data Link Security Protocol - Summary of Concept and Rationale"},{"key":"2023052911513847600_bib112","author":"Intelligence Newsletter","year":"1998","journal-title":"Anybody Need A GPS Jammer?"},{"key":"2023052911513847600_bib113","article-title":"Cheating at Pok\u00e9mon Go with a HackRF and GPS Spoofing","author":"rtl-sdr.com","year":"2016"},{"key":"2023052911513847600_bib114","article-title":"Assessing the spoofing threat: development of a portable GPS civilian spoofer","volume-title":"Proceedings of the Institute of Navigation GNSS (ION GNSS)","author":"Humphreys","year":"2008"},{"key":"2023052911513847600_bib115","first-page":"32","article-title":"Straight talk on anti-spoofing","volume":"23","author":"Wesson","year":"2012","journal-title":"Gps World"},{"key":"2023052911513847600_bib116","first-page":"19","article-title":"GPS spoofing countermeasures","volume":"25","author":"Warner","year":"2003","journal-title":"Homeland Secur J"},{"key":"2023052911513847600_bib117","first-page":"1285","article-title":"Countermeasures for GPS signal spoofing","volume-title":"Proceedings of the Eighteenth International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS)","author":"Wen","year":"2005"},{"key":"2023052911513847600_bib118","first-page":"127072","article-title":"GPS vulnerability to spoofing threats and a review of antispoofing techniques","volume":"2012","author":"Jafarnia-Jahromi","year":"2012","journal-title":"Int J Navig Obser"},{"key":"2023052911513847600_bib119","first-page":"1765","article-title":"Space missions cybersecurity","volume-title":"Proceedings of the AIAA SpaceOps 2014","author":"Vivero","year":"2014"},{"key":"2023052911513847600_bib120","author":"eoPortal, SwissCube"},{"key":"2023052911513847600_bib121","article-title":"Development and characterization of a propulsion system for CubeSats based on vacuum arc thrusters","author":"Pietzka","year":"2016"},{"key":"2023052911513847600_bib122","author":"Santangelo","year":"2021","journal-title":"The LinkStar Cybersecurity \u201cSandbox\u201d - A Platform to Test Cubesat Vulnerabilities within the Small Satellite Community"},{"key":"2023052911513847600_bib123","author":"CYSAT, Hack CYSAT","year":"2022"},{"key":"2023052911513847600_bib124","doi-asserted-by":"crossref","DOI":"10.1109\/SMC-IT51442.2021.00016","article-title":"CubeSat security attack tree analysis","volume-title":"Proceedings of the Eighth IEEE International Conference on Space Mission Challenges for Information Technology Virtual","author":"Falco","year":"2021"},{"key":"2023052911513847600_bib125","doi-asserted-by":"crossref","DOI":"10.2514\/6.2016-5604","article-title":"Achieving space mission resilience to cyber attack: architectural implications","volume-title":"Proceedings of the AIAA SPACE 2016 AIAA SPACE Forum","author":"Llanso","year":"2016"},{"key":"2023052911513847600_bib126","first-page":"91","article-title":"Cybersecurity implications of commercial off the shelf (COTS) equipment in space infrastructure","volume-title":"Space Infrastructures: From Risk to Resilience Governance","author":"Nussbaum","year":"2020"},{"key":"2023052911513847600_bib127","doi-asserted-by":"crossref","first-page":"151","DOI":"10.23919\/CyCon51939.2021.9468300","article-title":"The same boat: on small satellites, big rockets, and cyber trust","volume-title":"Proceedings of the 2021 Thirteenth International Conference on Cyber Conflict (CyCon)","author":"Pavur","year":"2021"},{"key":"2023052911513847600_bib128","doi-asserted-by":"crossref","DOI":"10.2514\/6.2020-4014","article-title":"When satellites attack: satellite-to-satellite cyber attack, defense and resilience","volume-title":"Proceedings of the ASCEND 2020 ASCEND","author":"Falco","year":"2020"},{"key":"2023052911513847600_bib129","first-page":"34","article-title":"Feasibility of satellite sabotage via TrojanCube","volume":"2","author":"Rath","year":"2021","journal-title":"Am J Sci Eng"},{"key":"2023052911513847600_bib130","volume-title":"Satellite Control Codes Stolen by Hackers","author":"Lemos","year":"2001"},{"key":"2023052911513847600_bib131","author":"Wilson","year":"2000","journal-title":"Teen Given Six Months for Hacking Into NASA"},{"key":"2023052911513847600_bib132","author":"Amazon Web Services"},{"key":"2023052911513847600_bib133","article-title":"Towards effective cybersecurity for modular, open architecture satellite systems","author":"Cunningham","year":"2016","journal-title":"Proceedings of the AIAA\/USU Conference on Small Satellites AIAA"},{"key":"2023052911513847600_bib134","doi-asserted-by":"crossref","DOI":"10.2514\/6.2013-5634","article-title":"Space missions cybersecurity modelling","volume-title":"Proceedings of the Thirty-first AIAA International Communications Satellite Systems Conference Florence","author":"Vivero","year":"2013"},{"key":"2023052911513847600_bib135","article-title":"Executive office of the president","author":"Space Policy Directive 5","year":"2020"},{"key":"2023052911513847600_bib136","doi-asserted-by":"crossref","DOI":"10.2514\/6.2021-4051","article-title":"Translating space cybersecurity policy into actionable guidance for space vehicles","author":"Tsamis","year":"2021","journal-title":"Proceedings of the ASCEND 2021"},{"key":"2023052911513847600_bib137","article-title":"Critical infrastructure protection: commercial satellite security should be more fully addressed","author":"U S Government Accountability Office","year":"2002"},{"key":"2023052911513847600_bib138","first-page":"155","article-title":"International cyber norms: legal, policy and industry perspectives","volume-title":"Simons Working Paper Series in Security and Development Tallinn","author":"Meyer","year":"2016"},{"key":"2023052911513847600_bib139","first-page":"116","article-title":"Cybersecurity and anti-satellite capabilities (ASAT): new threats and new legal responses","volume":"4","author":"Housen-Couriel","year":"2015","journal-title":"J Law Cyber Warfare"},{"key":"2023052911513847600_bib140","doi-asserted-by":"crossref","first-page":"273","DOI":"10.54648\/AILA2017019","article-title":"Satellites are just things on the Internet of Things","volume":"42","author":"Blount","year":"2017","journal-title":"Air Space Law"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac008\/50476484\/tyac008.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac008\/50476484\/tyac008.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T06:56:50Z","timestamp":1727420210000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac008\/6611670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":140,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac008","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac008"}}