Jessie Hamill-Stewart (University of Bristol and University of Bath), Awais Rashid (University of Bristol)

Satellite services are vital for many types of critical infrastructure, including electricity, finance and transportation. Sophisticated attackers therefore may target satellites, in order to create widespread disruption. The ground infrastructure of satellite systems offers attackers direct access to satellite systems, as this is where satellites are operated and monitored. We investigate the tactics and technology utilised by attackers of satellite ground systems, through analysis of previous attacks conducted against satellite ground infrastructure. Through this investigation, we contribute to growing literature surrounding cyber attacks against satellite systems, by providing empirical analysis of techniques and tactics used to attack ground infrastructure. Analysis of attack cases is presented, and then we discuss key findings and implications for future research.

View More Papers

CrowdGuard: Federated Backdoor Detection in Federated Learning

Phillip Rieger (Technical University of Darmstadt), Torsten Krauß (University of Würzburg), Markus Miettinen (Technical University of Darmstadt), Alexandra Dmitrienko (University of Würzburg), Ahmad-Reza Sadeghi (Technical University of Darmstadt)

Read More

Exploring the Influence of Prompts in LLMs for Security-Related...

Weiheng Bai (University of Minnesota), Qiushi Wu (IBM Research), Kefu Wu, Kangjie Lu (University of Minnesota)

Read More

Towards Real-time Voice Interaction Data Collection Monitoring and Ambient...

Tu Le (University of California, Irvine), Zixin Wang (Zhejiang University), Danny Yuxing Huang (New York University), Yaxing Yao (Virginia Tech), Yuan Tian (University of California, Los Angeles)

Read More

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang University), Zhikun Zhang (CISPA Helmholtz Center for Information Security and Stanford University), Min Chen (CISPA Helmholtz Center for Information Security), Minghu Zhao (Zhejiang University), Wenjing Fang (Ant Group), Lei Wang (Ant Group), Zihui Zhang (Zhejiang University), Wenzhi Chen (Zhejiang University)

Read More