{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:47:03Z","timestamp":1774716423408,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670390","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3287-3301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9736-1186","authenticated-orcid":false,"given":"Lingjing","family":"Yu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; Xingditansuo Co., Ltd, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3097-0833","authenticated-orcid":false,"given":"Jingli","family":"Hao","sequence":"additional","affiliation":[{"name":"Xingditansuo Co., Ltd, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9157-3683","authenticated-orcid":false,"given":"Jun","family":"Ma","sequence":"additional","affiliation":[{"name":"Sinsegye (Shenzhen) Computer System Co., LTD, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1796-9207","authenticated-orcid":false,"given":"Yong","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8965-6420","authenticated-orcid":false,"given":"Yijun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8196-2436","authenticated-orcid":false,"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"EECS and I2S, The University of Kansas, Lawrence, KS, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. KU-Band PLL LNB MODEL. https:\/\/www.stepelectronics.com.au\/wpcontent\/ uploads\/2020\/10\/NJRC-Ku-PLL-LNB-Ext_NJR2934E_35E_36E_37E _39E_rev07.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. lighttpd open-source web server. Available at: https:\/\/www.lighttpd.net\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Orbital 5400X Off-the-Shelf External Reference Ku-Band LNB. https:\/\/orbitalresearch.net\/wp-content\/uploads\/2019\/12\/Orbital-5400X-Offthe-Shelf-External-Reference-Ku-Band-LNB-web-1912.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"2013. CVE-2013--6034. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013--6034"},{"key":"e_1_3_2_1_5_1","unstructured":"2013. CVE-2013--6035. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013--6035"},{"key":"e_1_3_2_1_6_1","unstructured":"2014. CVE-2014-0326. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0326"},{"key":"e_1_3_2_1_7_1","unstructured":"2014. CVE-2014-0327. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0327"},{"key":"e_1_3_2_1_8_1","unstructured":"2014. CVE-2014--2942. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014--2942"},{"key":"e_1_3_2_1_9_1","unstructured":"2014. CVE-2014--2950. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014--2950"},{"key":"e_1_3_2_1_10_1","unstructured":"2014. CVE-2014--2951. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014--2951"},{"key":"e_1_3_2_1_11_1","unstructured":"2014. CVE-2014--2964. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014--2964"},{"key":"e_1_3_2_1_12_1","unstructured":"2015. CVE-2015--9222. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015--9222"},{"key":"e_1_3_2_1_13_1","unstructured":"2016. CVE-2016--9495. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016--9495"},{"key":"e_1_3_2_1_14_1","unstructured":"2016. CVE-2016--9496. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016--9496"},{"key":"e_1_3_2_1_15_1","unstructured":"2016. CVE-2016--9497. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016--9497"},{"key":"e_1_3_2_1_16_1","unstructured":"2018. CVE-2018--19391. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018--19391"},{"key":"e_1_3_2_1_17_1","unstructured":"2018. CVE-2018--19392. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018--19392"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"2019. CVE-2019--15652. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019--15652","DOI":"10.5465\/AMBPP.2019.15652abstract"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"2020. CVE-2020--12351. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--12351","DOI":"10.5465\/AMBPP.2020.12351abstract"},{"key":"e_1_3_2_1_20_1","unstructured":"2020. CVE-2020--24587. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--24587"},{"key":"e_1_3_2_1_21_1","unstructured":"2020. CVE-2020--24588. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--24588"},{"key":"e_1_3_2_1_22_1","unstructured":"LNB QUAD-BAND EXT REF 1000XU-2. [n. d.]. KU-Band PLL LNB MODEL. https:\/\/cdn.shopify.com\/s\/files\/1\/1094\/0100\/files\/1000xu_2_lnb.pd f?14577775421144751663"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3205426"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/jiere.1988.0021"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1421930"},{"key":"e_1_3_2_1_26_1","unstructured":"bleepingcomputer. 2022. Viasat confirms satellite modems were wiped with AcidRain malware. https:\/\/www.bleepingcomputer.com\/news\/security\/viasatconfirms- satellite-modems-were-wiped-with-acidrain-malware\/"},{"key":"e_1_3_2_1_27_1","volume-title":"2020 IEEE Aerospace Conference. IEEE.","author":"Matthew","unstructured":"Matthew Bradbury et al. 2020. Identifying attack surfaces in the evolving space industry using reference architectures. In 2020 IEEE Aerospace Conference. IEEE."},{"key":"e_1_3_2_1_28_1","unstructured":"breakingdefense. 2023. Comtech's Army SATCOM modem win opens door to cross-service sales. https:\/\/breakingdefense.com\/2023\/10\/comtechs-armysatcom- modem-win-opens-door-to-cross-service-sales\/"},{"key":"e_1_3_2_1_29_1","unstructured":"businesswire. 2020. Comtech Receives Satellite Modem Order. Available at: https:\/\/www.businesswire.com\/news\/home\/20201022005364\/en."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/sat.791"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2015.2505700"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1983.1145898"},{"key":"e_1_3_2_1_33_1","unstructured":"cyble. 2023. Hacktivists Targeting Satellite and Space Industry. https:\/\/cyble.co m\/blog\/ghostsec-targeting-satellite-receivers\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"E. Del Re A. Fanfani S. Morosi and L. S. Ronga. 2014. Robust modem design for satellite communications in emergency scenarios. In ASMS\/SPSC.","DOI":"10.1109\/ASMS-SPSC.2014.6934536"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.18"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1211"},{"key":"e_1_3_2_1_37_1","volume-title":"Resilient Satellite Communications with Autonomous Multi- Modem Adapter","author":"Gopal Rajeev","unstructured":"Rajeev Gopal. 2018. Resilient Satellite Communications with Autonomous Multi- Modem Adapter. In IEEE MILCOM."},{"key":"e_1_3_2_1_38_1","volume-title":"Software Radio: Technologies and Services","author":"GROUP.","unstructured":"WP3 GROUP. 2001. DSP-based CDMA satellite modem: CNIT\/ASI project. In Software Radio: Technologies and Services. Springer."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.345879"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1978.1094104"},{"key":"e_1_3_2_1_41_1","unstructured":"iDIRECT. [n. d.]. openAMIP. https:\/\/www.idirect.net\/products\/openamip\/"},{"key":"e_1_3_2_1_42_1","unstructured":"intelliantech. [n. d.]. Introducing the all new GX terminals for the Inmarsat Fleet Xpress service. https:\/\/www.intelliantech.com\/en\/products\/inmarsat-gxmaritime- terminals\/#"},{"key":"e_1_3_2_1_43_1","unstructured":"intelliantech. 2020. Inmarsat Partner focus: Intellian Technologies. https:\/\/www.inmarsat.com\/en\/insights\/government\/2020\/inmarsat-partnerfocus- intellian-technologies.html"},{"key":"e_1_3_2_1_44_1","unstructured":"intelliantech. 2023. case study of providing solutions. https:\/\/www.intelliantech. com\/en\/news\/case-study#"},{"key":"e_1_3_2_1_45_1","volume-title":"A real-time attack on the GMR-2 encryption algorithm in satellite phones. China Communications 14, 11","author":"Liu Jingmei","year":"2017","unstructured":"Jingmei Liu, Linsen Zhao, and Jingwei Liu. 2017. A real-time attack on the GMR-2 encryption algorithm in satellite phones. China Communications 14, 11 (2017)."},{"key":"e_1_3_2_1_46_1","unstructured":"Markets and Markets. 2021. Satellite Modem Companies - Comtech Telecommunications Corp. (US) and ST Engineering (Singapore) are the Key Players. Available at: https:\/\/www.marketsandmarkets.com\/ResearchInsight\/satellite-modemmarket. asp."},{"key":"e_1_3_2_1_47_1","unstructured":"meritalk. 2023. DISA Awards 16 Satellite-Based Services Contracts. https:\/\/ww w.meritalk.com\/articles\/disa-awards-16-satellite-based-services-contracts\/"},{"key":"e_1_3_2_1_48_1","unstructured":"osqzss. [n. d.]. Software-Defined GPS Signal SimulatorL. https:\/\/github.com\/osq zss\/gps-sdr-sim"},{"key":"e_1_3_2_1_49_1","unstructured":"H.I. Paul. 2002. Multi-carrier network-centric satellite communications modem design. In MILCOM."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"James Pavur et al. 2019. Secrets in the sky: on privacy and infrastructure security in dvb-s satellite broadband. In ACM WiSec.","DOI":"10.1145\/3317549.3323418"},{"key":"e_1_3_2_1_51_1","volume-title":"New Dawn for Space Security. In International Conference on Cyber Warfare and Security","volume":"17","author":"Plotnek Jordan","year":"2022","unstructured":"Jordan Plotnek and Jill Slay. 2022. New Dawn for Space Security. In International Conference on Cyber Warfare and Security, Vol. 17."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2019.2927852"},{"key":"e_1_3_2_1_53_1","volume-title":"Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing. arXiv","author":"Edd Salkield","year":"2023","unstructured":"Edd Salkield et al. 2023. Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing. arXiv (2023)."},{"key":"e_1_3_2_1_54_1","volume-title":"Z: On the Requirements of Satellite Downlink Overshadowing Attacks. In ACM WiSec.","author":"Edd Salkield","year":"2023","unstructured":"Edd Salkield et al. 2023. Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. In ACM WiSec."},{"key":"e_1_3_2_1_55_1","unstructured":"satmagazine. 2010. Comtech provides dSCPC bandwidth management of the space segment. Available at: http:\/\/www.satmagazine.com\/story.php?number =1881861986."},{"key":"e_1_3_2_1_56_1","unstructured":"Skybrokers. 2017. Skybrokers supported Teleport clients as well as Satellite Services Service providers with iDirect's new X3 X5 and X7-series. Available at: https:\/\/sky-brokers.com\/supplier\/idirect-technologies-inc\/."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"F. Takahata M. Yasunaga Y. Hirata T. Ohsawa and J. Namiki. 1987. A PSK Group Modem for Satellite Communications. IEEE ISAC 5 4 (1987).","DOI":"10.1109\/JSAC.1987.1146585"},{"key":"e_1_3_2_1_58_1","volume-title":"An Architecture of Group MODEM with Timesharing Processing for Satellite Communication Networks. In Joint Conference on Satellite Communications. 125--130","author":"Tanabe K.","unstructured":"K. Tanabe, Y. Sagawa, K. Kobayashi, K. Ohata, and M. Ueba. 2002. An Architecture of Group MODEM with Timesharing Processing for Satellite Communication Networks. In Joint Conference on Satellite Communications. 125--130."},{"key":"e_1_3_2_1_59_1","unstructured":"Moysis Tsamsakizoglou. 2012. Radiation tolerant satellite communication modem."},{"key":"e_1_3_2_1_60_1","volume-title":"Security Challenges When Space Merges with Cyberspace. arXiv preprint arXiv:2207.10798","author":"Varadharajan Vijay","year":"2022","unstructured":"Vijay Varadharajan and Neeraj Suri. 2022. Security Challenges When Space Merges with Cyberspace. arXiv preprint arXiv:2207.10798 (2022)."},{"key":"e_1_3_2_1_61_1","volume-title":"Space Odyssey: An Experimental Software Security Analysis of Satellites. In IEEE Symposium on Security and Privacy.","author":"Johannes","unstructured":"Johannes Willbold et al. 2023. Space Odyssey: An Experimental Software Security Analysis of Satellites. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_62_1","unstructured":"Lennert Wouters. 2022. Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal. Black Hat USA Las Vegas US."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19112554"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.299842"},{"key":"e_1_3_2_1_65_1","volume-title":"A new modem for two way satellite time and frequency transfer","author":"Zhang Shengkang","unstructured":"Shengkang Zhang, Xueyun Wang, Haifeng Wang, Hongbo Wang, Yuan Yuan, and Keming Feng. 2015. A new modem for two way satellite time and frequency transfer. In IEEE EFTF\/IFCS."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:01:43Z","timestamp":1755842503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":65,"alternative-id":["10.1145\/3658644.3670390","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670390","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}