卫星软件总线网络体系结构漏洞分析

Adrian Schalk, Luke Brodnik, Dane Brown
{"title":"卫星软件总线网络体系结构漏洞分析","authors":"Adrian Schalk, Luke Brodnik, Dane Brown","doi":"10.1109/MILCOM55135.2022.10017967","DOIUrl":null,"url":null,"abstract":"With the rapid expansion of the space industry, there has been a strong push to develop simple, reusable, and easy to deploy satellite system architecture solutions. The space industry may have assumed that the complexity of their systems of systems would make the vulnerability discovery process too difficult for attackers. However, focused research into the design of modern Software-Bus (SB) dependent satellite systems has the ability to reveal numerous vulnerabilities in deployed space system architectures. In particular, our in-depth analysis of NASA's open source core Flight System (cFS) resulted not only in the discovery of various novel vulnerabilities, but also the implementation of several straight-forward, practical exploits. Due to the lack of authentication required to execute commands via the SB as well as the inability to recover from an attack in a robust manner, cFS is vulnerable to a number of attacks through the SB entry point. This paper presents four exploit demonstrations on the unsecured cFS bus architecture, and then provides recommendations on how to secure against these attacks and make a modern satellite system architecture more robust.","PeriodicalId":239804,"journal":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Vulnerabilities in Satellite Software Bus Network Architecture\",\"authors\":\"Adrian Schalk, Luke Brodnik, Dane Brown\",\"doi\":\"10.1109/MILCOM55135.2022.10017967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid expansion of the space industry, there has been a strong push to develop simple, reusable, and easy to deploy satellite system architecture solutions. The space industry may have assumed that the complexity of their systems of systems would make the vulnerability discovery process too difficult for attackers. However, focused research into the design of modern Software-Bus (SB) dependent satellite systems has the ability to reveal numerous vulnerabilities in deployed space system architectures. In particular, our in-depth analysis of NASA's open source core Flight System (cFS) resulted not only in the discovery of various novel vulnerabilities, but also the implementation of several straight-forward, practical exploits. Due to the lack of authentication required to execute commands via the SB as well as the inability to recover from an attack in a robust manner, cFS is vulnerable to a number of attacks through the SB entry point. This paper presents four exploit demonstrations on the unsecured cFS bus architecture, and then provides recommendations on how to secure against these attacks and make a modern satellite system architecture more robust.\",\"PeriodicalId\":239804,\"journal\":{\"name\":\"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM55135.2022.10017967\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM55135.2022.10017967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

随着航天工业的迅速发展,开发简单、可重复使用和易于部署的卫星系统架构解决方案成为一种强有力的推动力。航天工业可能认为,其系统的复杂性会使漏洞发现过程对攻击者来说过于困难。然而,对现代软件总线(SB)相关卫星系统设计的重点研究有能力揭示部署空间系统架构中的许多漏洞。特别是,我们对NASA的开源核心飞行系统(cFS)进行了深入分析,不仅发现了各种新的漏洞,而且还实施了几个直接的实际漏洞利用。由于缺乏通过SB执行命令所需的身份验证,以及无法以健壮的方式从攻击中恢复,cFS很容易受到通过SB入口点的许多攻击。本文针对不安全的cFS总线体系结构进行了四种攻击演示,并就如何防范这些攻击提出了建议,从而使现代卫星系统体系结构更加健壮。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
With the rapid expansion of the space industry, there has been a strong push to develop simple, reusable, and easy to deploy satellite system architecture solutions. The space industry may have assumed that the complexity of their systems of systems would make the vulnerability discovery process too difficult for attackers. However, focused research into the design of modern Software-Bus (SB) dependent satellite systems has the ability to reveal numerous vulnerabilities in deployed space system architectures. In particular, our in-depth analysis of NASA's open source core Flight System (cFS) resulted not only in the discovery of various novel vulnerabilities, but also the implementation of several straight-forward, practical exploits. Due to the lack of authentication required to execute commands via the SB as well as the inability to recover from an attack in a robust manner, cFS is vulnerable to a number of attacks through the SB entry point. This paper presents four exploit demonstrations on the unsecured cFS bus architecture, and then provides recommendations on how to secure against these attacks and make a modern satellite system architecture more robust.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信