Historically, the high costs associated with satellite manufacturing, design, and launch limited satellite production to government agencies or research institutions. However, in recent years, the development and widespread use of small satellites have emerged due to the significant reduction in launch costs associated with their smaller size. Consequently, projects developing satellite protocols and DIY cub satellites have proliferated. This study shares insights into classic vulnerabilities identified in past satellite attack research, along with new security issues we have discovered. We focus on a recent open-source satellite project, SPACECAN, and the decade-old open-source satellite communication protocol, libcsp, which is already in use by satellites. Our research identifies three vulnerabilities in the SPACECAN project related to CAN bus message transmission and highlights a flaw in message verification within the libcsp project. By revealing these vulnerabilities, we aim to raise awareness about the security of satellite communication systems, advocate for secure implementations in open-source satellite projects, and provide actionable recommendations to mitigate these risks.
TOPIC / TRACK
Space Cybersecurity Forum
Live Translation Session
LOCATION
Taipei Nangang Exhibition Center, Hall 2
1F 1A
LEVEL
Advanced Advanced sessions explore
cybersecurity topics, including
architecture, tools, practical experiences, and strategy
comparisons. Content often features code explanations,
protocol analysis, reverse engineering, live demos, and is
suitable for experienced cybersecurity
professionals.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
Real-Time Chinese & English Translation
SUBTOPIC
Vulnerability Assessment
Protocol Analysis
Satellite Cybersecurity
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。