Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently orbiting the Earth from an IT perspective.
Moritz Schloegel (left) and Johannes Willbold analyzed the safety of satellites. In their hands they hold a model of a small satellite.
They analyzed three current low-earth orbit satellites and found that, from a technical point of view, only some modern security concepts were implemented. Various security mechanisms that are standard in modern mobile phones and laptops were not to be found: for example, there was no separation of code and data. Interviews with satellite developers also revealed that the industry relies primarily on security through obscurity.
The results were presented by a team headed by Johannes Willbold, a PhD student from Bochum, Dr. Ali Abbasi, a researcher from Saarbrücken, and Professor Thorsten Holz, formerly in Bochum, now in Saarbrücken.
Satellites put to the test
The examined satellites were two small models and one medium-sized model – research satellites as well as a satellite of a commercial company – which orbit the Earth at a short distance and are used to observe the Earth.
Gaining access to satellites and their software was a challenge for the team, as commercial providers in particular rarely wish to reveal any details. The researchers eventually gained access through cooperation with the European Space Agency (ESA), various universities involved in the construction of satellites, and a commercial enterprise.
The team from Bochum and Saarbrücken conducted a thorough security analysis of the three models. They looked in detail at what the software running on the devices does and which communication protocols are used. They emulated the systems, i.e., rebuilt them virtually, so that they could test the software as if it were in a real satellite. “It was a very different world from the systems we usually study. For example, completely different communication protocols were used,” as Thorsten Holz outlines the process.
Systems with specific requirements
Satellites orbiting the Earth can only be reached by their ground station on Earth within a time window of a few minutes. The systems must be robust against the radiation in space, and, since they can only consume a small amount of energy, they have a low power output. “The data rates are like those of modems in the 1990s,” as Holz elaborates the challenges satellite developers face.
Based on the findings gained from the software analysis, the researchers worked out various attack scenarios. They showed that they could cut off the satellites from ground control and seize control of the systems, for example in order to take pictures with the satellite camera.
“We were surprised that the technical security level is so low,” points out Thorsten Holz, adding the following caveat with regard to potential ramifications: “It wouldn’t be all that easy to steer the satellite to another location, for example, to crash it or have it collide with other objects.”
Developers
To find out how the people who develop and build satellites approach security, the research team compiled a questionnaire and submitted it to research institutions, the ESA, the German Aerospace Centre and various enterprises. Nineteen developers participated anonymously in the survey.
“The results show us that the understanding of security in the industry is different than in many other areas, specifically that it’s security by obscurity,” concludes Johannes Willbold.
Many of the respondents therefore assumed that satellites could not be attacked because there is no documentation of the systems, i.e., nothing is known about them. Only a few said that they encrypt data when communicating with satellites or use authentication in order to ensure that only the ground station is allowed to communicate with the satellite.
“However, a lack of documentation doesn’t necessarily protect against attacks,” points out Moritz Schloegel, co-author of the paper.
“Today, systems can be figured out through reverse engineering and their vulnerabilities can be identified. One of the goals of our project was therefore to bring the satellite and security communities together to promote a mutual understanding of the challenges of space applications and of the security standards that are in use today,” Schloegel concluded.