{"id":2249,"date":"2023-06-01T19:22:54","date_gmt":"2023-06-01T17:22:54","guid":{"rendered":"https:\/\/www.spacesecurity.info\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/"},"modified":"2023-06-01T19:22:54","modified_gmt":"2023-06-01T17:22:54","slug":"space-odyssey-an-experimental-software-security-analysis-of-satellites","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/","title":{"rendered":"Space Odyssey: An Experimental Software Security Analysis of Satellites"},"content":{"rendered":"<p>The abstact below is taken from a paper written by <a href=\"https:\/\/twitter.com\/jwillbold\">Johannes Willbold<\/a>, <a href=\"https:\/\/twitter.com\/m_u00d8\">Moritz Schloegel<\/a>, Manuel Vogele, Maximilian Gerhardt, <a href=\"https:\/\/twitter.com\/thorstenholz\">Thorsten Holz<\/a> and <a href=\"https:\/\/twitter.com\/AlixAbbasi\">Ali Abbasi<\/a>.<\/p>\n<p>This paper was presented at the 44th IEEE Symposium on Security and Privacy (S&amp;P) and received a distinguished paper award.<\/p>\n<p>In this paper, they analyze the security of three real-world satellites and discover 13 vulnerabilities that enable attackers take over two of them. They also publish a survey confirms that these are widespread issues.<\/p>\n<p>Terms used in this abstract are : satellites, satellite security, space segment, satellite firmware, threat taxonomy, software security.<\/p>\n<p>The paper can be downloaded here : <a href=\"https:\/\/jwillbold.com\/paper\/willbold2023spaceodyssey.pdf\">source 1<\/a>, <a href=\"https:\/\/mschloegel.me\/paper\/willbold2023spaceodyssey.pdf\">source 2<\/a>, <a href=\"https:\/\/publications.cispa.saarland\/3934\/\">source 3<\/a><\/p>\n<p><strong>Abstract<\/strong> \u2014 <em>Satellites are an essential aspect of our modern society and have contributed significantly to the way we live today, most notable through modern telecommunications, global positioning, and Earth observation. In recent years, and especially in the wake of the New Space Era, the number of satellite deployments has seen explosive growth. Despite its critical importance, little academic research has been conducted on satellite security and, in particular, on the security of onboard firmware. This lack likely stems from by now outdated <\/em><em>assumptions on achieving security by obscurity, effectively preventing meaningful research on satellite firmware.<\/em><\/p>\n<p><em>In this paper, we first provide a taxonomy of threats against satellite firmware. We then conduct an experimental security analysis of three real-world satellite firmware images. We base our analysis on a set of real-world attacker models and find several security-critical vulnerabilities in all analyzed firmware images. The results of our experimental security assessment show that modern in-orbit satellites suffer from different software security vulnerabilities and often a lack of proper access protection mechanisms. They also underline the need to overcome prevailing but obsolete assumptions. To substantiate our observations, we also performed a survey of 19 professional satellite developers to obtain a comprehensive picture of the satellite security landscape.<\/em><\/p>\n<p>The figure below is a taxonomy of threats against satellite firmware<\/p>\n<figure id=\"attachment_2240\" aria-describedby=\"caption-attachment-2240\" style=\"width: 963px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2240 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware.jpg\" alt=\"\" width=\"963\" height=\"267\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware.jpg 963w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware-300x83.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware-768x213.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware-696x193.jpg 696w\" sizes=\"auto, (max-width: 963px) 100vw, 963px\" \/><\/a><figcaption id=\"caption-attachment-2240\" class=\"wp-caption-text\">A taxonomy of threats against satellite firmware<\/figcaption><\/figure>\n<p>The figure below is a the OPS-SAT threat model<\/p>\n<figure id=\"attachment_2238\" aria-describedby=\"caption-attachment-2238\" style=\"width: 735px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/The-OPS-SAT-threat-model.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2238 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/The-OPS-SAT-threat-model.jpg\" alt=\"\" width=\"735\" height=\"224\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/The-OPS-SAT-threat-model.jpg 735w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/The-OPS-SAT-threat-model-300x91.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/The-OPS-SAT-threat-model-696x212.jpg 696w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><figcaption id=\"caption-attachment-2238\" class=\"wp-caption-text\">The OPS-SAT threat model<\/figcaption><\/figure>\n<p>The figure below is an overview of the vulnerabilities identified in the satellite bus and their attacker paths<\/p>\n<figure id=\"attachment_2236\" aria-describedby=\"caption-attachment-2236\" style=\"width: 729px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2236 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg\" alt=\"\" width=\"729\" height=\"278\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg 729w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities-300x114.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities-696x265.jpg 696w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><figcaption id=\"caption-attachment-2236\" class=\"wp-caption-text\">An overview of the vulnerabilities identified in the satellite bus and their attacker paths<\/figcaption><\/figure>\n<p>CISPA researchers have contributed to twelve papers at this year\u2019s. Four of these papers have received the highest honor: A Distinguished Paper Award, given out to the top 1% of submitted papers. Congratulations to everyone involved!<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2244\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-1024x1024.jpg\" alt=\"\" width=\"696\" height=\"696\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-1024x1024.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-300x300.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-150x150.jpg 150w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-768x768.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-696x696.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1-1068x1068.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/FwzG_ivWwAMzjEY-1.jpg 1080w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>Go to this paper here : <a href=\"https:\/\/jwillbold.com\/paper\/willbold2023spaceodyssey.pdf\">source 1<\/a>, <a href=\"https:\/\/mschloegel.me\/paper\/willbold2023spaceodyssey.pdf\">source 2<\/a>, <a href=\"https:\/\/publications.cispa.saarland\/3934\/\">source 3<\/a><\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/Space-Odissey.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2246\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/Space-Odissey.jpg\" alt=\"\" width=\"469\" height=\"565\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/Space-Odissey.jpg 469w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/Space-Odissey-249x300.jpg 249w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The abstact below is taken from a paper written by Johannes Willbold, Moritz Schloegel, Manuel Vogele, Maximilian Gerhardt, Thorsten Holz and Ali Abbasi. This paper was presented at the 44th IEEE Symposium on Security and Privacy (S&amp;P) and received a distinguished paper award. In this paper, they analyze the security of three real-world satellites and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2237,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,22,20,28],"tags":[],"class_list":{"0":"post-2249","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-hacking-en","9":"category-news","10":"category-satellite-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"The abstact below is taken from a paper written by Johannes Willbold, Moritz Schloegel, Manuel Vogele, Maximilian Gerhardt, Thorsten Holz and Ali Abbasi. This paper was presented at the 44th IEEE Symposium on Security and Privacy (S&amp;P) and received a distinguished paper award. In this paper, they analyze the security of three real-world satellites and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-01T17:22:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware.jpg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"Space Odyssey: An Experimental Software Security Analysis of Satellites\",\"datePublished\":\"2023-06-01T17:22:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/\"},\"wordCount\":444,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/overview-of-the-vulnerabilities.jpg\",\"articleSection\":[\"Cyber\",\"Hacking\",\"News\",\"Satellite\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/\",\"name\":\"Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/overview-of-the-vulnerabilities.jpg\",\"datePublished\":\"2023-06-01T17:22:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/overview-of-the-vulnerabilities.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/overview-of-the-vulnerabilities.jpg\",\"width\":729,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-odyssey-an-experimental-software-security-analysis-of-satellites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Space Odyssey: An Experimental Software Security Analysis of Satellites\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/","og_locale":"en_US","og_type":"article","og_title":"Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info","og_description":"The abstact below is taken from a paper written by Johannes Willbold, Moritz Schloegel, Manuel Vogele, Maximilian Gerhardt, Thorsten Holz and Ali Abbasi. This paper was presented at the 44th IEEE Symposium on Security and Privacy (S&amp;P) and received a distinguished paper award. In this paper, they analyze the security of three real-world satellites and [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2023-06-01T17:22:54+00:00","og_image":[{"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/taxonomy-of-threats-against-satellite-firmware.jpg","type":"","width":"","height":""}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"Space Odyssey: An Experimental Software Security Analysis of Satellites","datePublished":"2023-06-01T17:22:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/"},"wordCount":444,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg","articleSection":["Cyber","Hacking","News","Satellite"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/","url":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/","name":"Space Odyssey: An Experimental Software Security Analysis of Satellites - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg","datePublished":"2023-06-01T17:22:54+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/06\/overview-of-the-vulnerabilities.jpg","width":729,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/space-odyssey-an-experimental-software-security-analysis-of-satellites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"Space Odyssey: An Experimental Software Security Analysis of Satellites"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2249"}],"version-history":[{"count":0,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2237"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}