Strategies and their Real-world Evaluation
Johannes Willbold*, Franklyn Sciberras‡,
Martin Strohmeier^, Vincent Lenders^
*Ruhr University Bochum, Chair for Systems Security
‡ETH Zürich, Department of Computer Science,
^armasuisse Science + Technology, Cyber-Defence Campus
v1.0
External Attacker
Privilieged Attacker
Privilieged Attacker
No Technical Insights
Received Access Credentials
→ On-Board Reconnaissance
18 Reconnaissance Goals
12 Reconnaissance Strategies
2 Strategy Evaluations
Spacecraft Tracking & Operations
Radio Communication Parameters
Network Protocol Stacks
TMTC Protocols
=> Common goals not all
Open Databases
Public Regulator Filings
Common Options
COTS Analysis
Passive Traffic Analysis
Active Enumeration
Satellite Space Stations: Application to Launch and Operate
GS Location Inference
Vendor Documentation
Software Reverse Engineering
?
!
TC ID 0x1
TC ID 0x2
TC ID 0x1337
?
- 255 potential services
- Each Services: 255 potential subservices
=> 65.035 potential Subservices
=> Simple Iteration
18 Reconnaissance Goals
12 Reconnaissance Strategies
2 Strategy Evaluations