{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:39:52Z","timestamp":1768005592667,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,29]]},"DOI":"10.1145\/3736731.3746144","type":"proceedings-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T11:58:19Z","timestamp":1761047899000},"page":"51-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Reproducible and Open-Source Testbed for Satellite Cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9603-4952","authenticated-orcid":false,"given":"Roy","family":"Peled","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6409-6060","authenticated-orcid":false,"given":"Roee","family":"Idan","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1078-0380","authenticated-orcid":false,"given":"Tomer","family":"Galor","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3956-265X","authenticated-orcid":false,"given":"Ofir","family":"Chodeda","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9606-5565","authenticated-orcid":false,"given":"Eli","family":"Marcus","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-4059","authenticated-orcid":false,"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-128X","authenticated-orcid":false,"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"European\u00a0Space Agency. 2023. OPS-SAT. https:\/\/www.esa.int\/Enabling_Support\/Operations\/OPS-SAT Accessed: 2024-11-16."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2022-4380"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.14722\/spacesec.2024.23074"},{"key":"e_1_3_3_2_5_2","unstructured":"Dominant\u00a0Systems Corporation. 2023. Satellite Cyber Security. https:\/\/www.dominantisc.ca\/satellite-cyber-security Accessed: 2024-11-16."},{"key":"e_1_3_3_2_6_2","unstructured":"Nanosats Database. 2023. Nanosats Database: The Comprehensive Database of Nanosatellites. https:\/\/www.nanosats.eu\/ Accessed: 2024-11-16."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Kevin Fauvel Tao Lin V\u00e9ronique Masson \u00c9lisa Fromont and Alexandre Termier. 2021. Xcm: An explainable convolutional neural network for multivariate time series classification. Mathematics 9 23 (2021) 3137.","DOI":"10.3390\/math9233137"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.3019471"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2023-4768"},{"key":"e_1_3_3_2_10_2","unstructured":"European Union\u00a0Agency for Cybersecurity\u00a0(ENISA). 2023. Low Earth Orbit (LEO) SATCOM Cybersecurity Assessment. https:\/\/www.enisa.europa.eu\/publications\/low-earth-orbit-leo-satcom-cybersecurity-assessment Accessed: 2024-12-06."},{"key":"e_1_3_3_2_11_2","unstructured":"Marsal Gavalda and SentinelOne Labs. 2023. AcidPour: A New Variant of AcidRain Malware Discovered Targeting Ukrainian Modems. https:\/\/www.sentinelone.com\/labs\/acidpour-linux-wiper-malware-variant-ukraine\/."},{"key":"e_1_3_3_2_12_2","unstructured":"Paul\u00a0D. Groves and Ziyi Jiang. 2022. GNSS spoofing and detection: A review. IEEE Access 10 (2022) 5051\u20135078. https:\/\/doi.org\/10.1109\/ACCESS.2021.3137823"},{"key":"e_1_3_3_2_13_2","unstructured":"Fang Guo Yu Chen and Li Zhang. 2023. Security Threats in Space-Air-Ground Integrated Networks (SAGINs). IEEE Trans. Aerospace Electron. Systems 60 3 (2023) TBD."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/AERO58975.2024.10521045"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.14722\/spacesec.2023.239792"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Roee Idan Roy Peled Aviel Ben\u00a0Siman Tov Eli Markus Boris Zadov Ofir Chodeda Yohai Fadida Oliver Holschke Jan Plachy Asaf Shabtai et\u00a0al. 2025. AegisSat: A Satellite Cybersecurity Testbed. NDSS SpaceSec 2025 (2025) TBD.","DOI":"10.14722\/spacesec.2025.23069"},{"key":"e_1_3_3_2_17_2","unstructured":"Masafumi IMAI Kazumasa IMAI Nobuto HIRAKOSO Masanori NISHIO Taku TAKADA Kentaro KITAMURA Jun NAKAYA Yukikazu MURAKAMI Masahiro TOKUMITSU and Kan FUKAI. 2024. One-Year Operation of Technology Demonstration CubeSat KOSEN-1. Journal of Evolving Space Activities 2 (2024) 215."},{"key":"e_1_3_3_2_18_2","unstructured":"Cyber\u00a0Peace Institute. 2022. Case Study Viasat. https:\/\/cyberconflicts.cyberpeaceinstitute.org\/law-and-policy\/cases\/viasat"},{"key":"e_1_3_3_2_19_2","unstructured":"G\u00fcnter Krebs. 2024. $50SAT (Eagle 2 MO 76 Morehead-OSCAR 76). https:\/\/space.skyrocket.de\/doc_sdat\/%2450sat.htm. Accessed: 2025-05-26."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Ming Li and Cheng Wang. 2020. Cybersecurity in Earth Observation: Challenges and Solutions. Remote Sensing 12 21 (2020) 3600. https:\/\/doi.org\/10.3390\/rs12213600","DOI":"10.3390\/rs12213600"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"O Liubimov and M Liubimov. 2023. Use of open-source Cots\/Mots hardware and software platforms for the build up of the CubeSat nanosatellites. Journal of Rocket-Space Technology 31 4 (2023) 138\u2013147.","DOI":"10.15421\/452318"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Mark Manulis Christopher\u00a0P Bridges Richard Harrison Venkkatesh Sekar and Andy Davis. 2021. Cyber security in new space: analysis of threats key enabling technologies and challenges. International Journal of Information Security 20 (2021) 287\u2013311.","DOI":"10.1007\/s10207-020-00503-w"},{"key":"e_1_3_3_2_23_2","unstructured":"Ryan Melton. 2016. Ball Aerospace COSMOS open source command and control system."},{"key":"e_1_3_3_2_24_2","unstructured":"Mathias Mesich. 2022. Satellite Cybersecurity Act of 2022 Highlights Growing Importance of Satellite Networks in Critical Infrastructure. https:\/\/www.industrialdefender.com Accessed: 2024-10-07."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"James Pavur and Ivan Martinovic. 2022. Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight. Journal of Cybersecurity 8 1 (2022) tyac008.","DOI":"10.1093\/cybsec\/tyac008"},{"key":"e_1_3_3_2_26_2","unstructured":"Roy Peled Eran Aizikovich Edan Habler Yuval Elovici and Asaf Shabtai. 2023. Evaluating the Security of Satellite Systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.01330 TBD TBD (2023) TBD."},{"key":"e_1_3_3_2_27_2","unstructured":"Pumpkin Inc.2025. CubeSat Kit Upgrade to MSP430. https:\/\/www.pumpkinspace.com\/store\/p147\/CubeSat_Kit_Upgrade_to_MSP430.html. Accessed: 2025-05-26."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2021.0552"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Claudio Sanso\u00e8 Maurizio Tranchero et\u00a0al. 2011. Use of FRAM Memories in Spacecrafts. Ferroelectrics - Applications 126 1 (2011) 213\u2013230.","DOI":"10.5772\/18529"},{"key":"e_1_3_3_2_30_2","unstructured":"Martin Strohmeier James Pavur and Giorgio Tresoldi. 2023. Space Odyssey: An Experimental Software Security Analysis of Satellites. IEEE Symposium on Security and Privacy 44 2 (2023) TBD."},{"key":"e_1_3_3_2_31_2","unstructured":"Ming Xie Wei Zhang and Lin Chen. 2023. Key Technologies and Challenges for LEO Mega-Constellations in 6G Global Coverage. IEEE Wireless Communications 30 5 (2023) TBD."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Pingyue Yue Jianping An Jiankang Zhang Jia Ye Gaofeng Pan Shuai Wang Pei Xiao and Lajos Hanzo. 2023. Low Earth Orbit Satellite Security and Reliability: Issues Solutions and the Road Ahead. IEEE Communications Surveys & Tutorials 25 4 (2023) TBD.","DOI":"10.1109\/COMST.2023.3296160"}],"event":{"name":"ACM REP '25: ACM Conference on Reproducibility and Replicability","location":"Vancouver Canada","acronym":"ACM REP '25","sponsor":["EIGREP Emerging Interest Group on Reproducibility and Replicability"]},"container-title":["Proceedings of the 3rd ACM Conference on Reproducibility and Replicability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3736731.3746144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:05:31Z","timestamp":1767981931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3736731.3746144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":31,"alternative-id":["10.1145\/3736731.3746144","10.1145\/3736731"],"URL":"https:\/\/doi.org\/10.1145\/3736731.3746144","relation":{},"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"2025-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}