43
Author Company/Organization Conference Name, Conference Dates Conference Location Presentation Title AIAA Aerospace Cybersecurity Working Group DEF CON 29 Aerospace Village, August 6-7 Copyright © by aiaa.org Published by the American Institute of Aeronautics and Astronautics, Inc., with permission. CubeSAT Cybersecurity Challenge

CubeSAT Cybersecurity Challenge Presentation Title

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CubeSAT Cybersecurity Challenge Presentation Title

Author

Company/Organization

Conference Name, Conference Dates

Conference Location

Presentation Title

AIAA Aerospace Cybersecurity Working Group

DEF CON 29 Aerospace Village, August 6-7

Copyright © by aiaa.org

Published by the American Institute of Aeronautics and Astronautics, Inc., with permission.

CubeSAT Cybersecurity Challenge

Page 2: CubeSAT Cybersecurity Challenge Presentation Title

Contributors

⮚ Arun Viswanathan, Jet Propulsion Laboratory, California Institute of Technology

⮚ Andrew Santangelo, SciZone

⮚ Gregory Falco, Stanford University

⮚ Jeremy Straub, NDSU

⮚ Michel Ingham, Jet Propulsion Laboratory, California Institute of Technology

⮚ Steve Lee, AIAA

2

Page 3: CubeSAT Cybersecurity Challenge Presentation Title

Introduction to the Session

⮚ Workshop Objectives

⮚ Interactive content like this event and the table top exercise are key to AIAA's aerospace cybersecurity strategy

⮚ A best practice in cybersecurity—and in aerospace

⮚ What this workshop is about?

⮚ A learning—not competitive—activity

⮚ Primarily cultivation of technological cybersecurity skill—but also the people and process skills for cybersecurity to succeed

3

Page 4: CubeSAT Cybersecurity Challenge Presentation Title

Agenda

⮚ Introduction to the session – 5 Minutes

Steve Lee – AIAA

⮚ Section 1: CubeSAT 101

Andrew Santangelo, SciZone

⮚ Section 2: Attack Methodology – Think Like a Hacker

Greg Falco, Stanford University

⮚ Section 3: Attacking CubeSATs - Live Interactive Session + Demo

Greg Falco, Stanford University

Arun Viswanathan, Jet Propulsion Laboratory, California Institute of Technology

⮚ Section 4: Thoughts on Mitigations

Open discussion

⮚ Section 5: Lessons Learned and Conclusions

Open discussion

⮚ Section 6: Homework Hackathon (open to all)

Open discussion

⮚ Final Thoughts, Conclusions and Q&A

4

• 5 minutes Q&A after section 1, 2 and 3

• Please use the chat to ask questions

• Links to Zoom Sessions (8/6, 8/7) and session handouts

are located at

https://aerospacevillage.org/aiaa-cubesat-hacking-workshop

Page 5: CubeSAT Cybersecurity Challenge Presentation Title

Section 1: Cube/Small SAT 101

Page 6: CubeSAT Cybersecurity Challenge Presentation Title

Situational Landscape

6

• Civic Operations• Hobbyists

• Education Missions• Commercial Enterprise

• Scientific Missions• Military Operations

Page 7: CubeSAT Cybersecurity Challenge Presentation Title

CubeSat/Small Satellite Market Size

7

“Status and Trends of SmallSats and Their Launch Vehicles, an Up-to-date

Review”, Journal of Aerospace Technology and Management, J. Aerosp.

Technol. Manag. vol.9 no.3 São José dos Campos July/Sept. 2017

Cubesat growth >1,400 units/year by 2022

Mini-satellite Growth >250 units/year by 2022

Page 8: CubeSAT Cybersecurity Challenge Presentation Title

Sample of CubeSat/SmallSat Missions

8

MarCO Cubesats

Asteria

NRL Cubesat

Auburn TRYAD Mission

HSFL Neutron-1 Mission Carthage College CaNop Mission

Page 9: CubeSAT Cybersecurity Challenge Presentation Title

Components of a CubeSAT

9

Kim, Yuri V. "Satellite Control System: Part I-Architecture and

Main Components." Satellite Systems-Design, Modeling,

Simulation and Analysis. IntechOpen, 2020.

Carthage College CaNOP Cubesat

Carthage College

CaNOP Cubesat

Page 10: CubeSAT Cybersecurity Challenge Presentation Title

Components of A Generic Space System

10

Ground StationCommunications Signal and Infrastructure

Space Vehicle

1. As defined in, Memorandum on Space Policy Directive – 5 Cybersecurity Principles for Space Systems, Sep 2020

Page 11: CubeSAT Cybersecurity Challenge Presentation Title

sci_Zone LinkStar-QuickSAT Architecture

11

AWS, AWS Gov Cloud,

or Other Cloud Based

Servers

Page 12: CubeSAT Cybersecurity Challenge Presentation Title

QuickSAT

Flight Computer

Xilinx Zynq

UltraScale MPSoC

• Integrated ARM-53, FPGA or Modified BeagleBone Black/AI

• QuickSAT Power Management • 0.5U form factor• 1-4W • Watchdog timers and external signal

reset• Hypervisor

Other Computers

LinkStar-TRK

LinkStar-D

LinkStar-HD

S-Band/X-Band

Components of LinkStar Architecture

OEM-719, ADA Fruit UltimateGPS

GPS

Sensors

Actuators

Page 13: CubeSAT Cybersecurity Challenge Presentation Title

SciZone QuickSAT Architecture

13

⮚ Broad Use: Aviation, Satellites, Cars

⮚ A complete Flight Management System

⮚ Vehicle Health Management & Monitoring

⮚ Vehicle Commanding Services

⮚ Communications services

⮚ Test/Monitoring interface

⮚ Can serve as a stand alone ground station or part of an expanded environment

⮚ Customizable

⮚ Utilizes open source software where possible

⮚ Works on a range of flight hardware

⮚ Web based Interface - PCs, Tablets, etc.

Page 14: CubeSAT Cybersecurity Challenge Presentation Title

CubeSATs are IoTs in Space!

14

Page 15: CubeSAT Cybersecurity Challenge Presentation Title

sci_Zone™Servers

Customer Mission Control

sci_Zone, Inc.www.sci-

zone.com

Globalstar™Ground Station

Globalstar™Satellite

IoTs in Space: LinkStar-QuickSAT Example

Page 16: CubeSAT Cybersecurity Challenge Presentation Title

Space Systems are Vulnerable to Cyber Attacks

ROSAT X-Ray Attack - 1998

16

Page 17: CubeSAT Cybersecurity Challenge Presentation Title

Example Cyber Incidents Against Space Systems

17

Since 20073 several elite APT groups have been using — and abusing — satellite links to manage their operations —most often, their C&C infrastructure, for example, Turla.Black Hat 20202: Eavesdropping on Sat ISPs. Basically, ISP not protecting their links and it can be picked up easily.

April 20054: A rogue program penetrated NASA KSC networks, surreptitiously gathered data from computers in the Vehicle Assembly Building and removed that data through covert channels.20115: Cybercriminals managed to compromise the accounts of about 150 most privileged JPL users.

June/July 20081: Terra EOS AM-1/Landsat-7, attempted satellite hijacking, hackers achieved all steps for remote command of satellite.2013-2014:6 UT Austin Radio-Navigation Lab conducts GPS spoofing for UAV control and navigation interruption

1. SPACE: Cybersecurity’s Final Frontier, London Cyber Security Report,

June 2015.

2. Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping

Hack, Threatpost, Aug. 2020

3. Turla APT Group Abusing Satellite Internet Links, Threatpost, Sep. 2015

4. Network Security Breaches Plague NASA, Bloomberg, Nov 2008

5. Hackers Seized Control of Computers in NASA's Jet Propulsion Lab,

WIRED, Mar. 2012

6. UT Austin Radio Radionavigation Laboratory

Page 18: CubeSAT Cybersecurity Challenge Presentation Title

Section 2: Attack Methodology

Page 19: CubeSAT Cybersecurity Challenge Presentation Title

High-Level Threats Against Satellites

Threat Applicability Description Impact Example

Unauthorized control

Space segment,ground segment

A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource

Adversary assumes remote control of a spacecraft, or ground systems.

Corruption / modification of system and/or data

Space segment, ground segment,Link segment

A type of threat action that undesirably alters system operation by adversely modifying system functions or data. Subtypes: “tampering,” “malicious logic,” “hardware/software error”

A corrupted spacecraft command could result in catastrophic loss if either no action occurred (e.g., command is discarded) or the wrong action was taken onboard aspacecraft.

19Adapted from CCSDS 350.1-G-2 Security Threats Against Space Missions

Page 20: CubeSAT Cybersecurity Challenge Presentation Title

High-Level Threats Against Satellites

Threat Applicability Description Impact Example

Interception of data

Space segment,ground segment,space-link communication

A type of threat action whereby an unauthorized entity directly accesses sensitive data while the data is traveling between authorized sources and destinations. Subtypes: "RF analysis," "wiretapping," "theft"

Interception of data may result in the loss of data confidentiality and data privacy if the data is not encrypted.

Jamming Space segment,ground segment,space-link communication

A type of threat action that attempts to interfere with the reception of broadcast communications. Adversary can deny RF communications to/from spacecraft by injecting noise, by transmitting on the same frequency from another source, or by simply overpowering the original source.

Spacecraft commanding as well as the ability to receive science or engineering data from the spacecraft could be blocked. Authorized access may be impacted.

20Adapted from CCSDS 350.1-G-2 Security Threats Against Space Missions

Page 21: CubeSAT Cybersecurity Challenge Presentation Title

High-Level Threats Against Satellites

Threat Applicability Description Impact Example

Denial-of-Service

Space segment,ground segment

The prevention of authorized access to a system resource or the delaying of system operations and functions.

Consumption of resources (e.g., communication bandwidth, processor bandwidth, disk space, memory), disruption of system/network configurations (e.g., routing changes), disruption of state information (e.g., persistent network connection resets), disruption of network components (e.g., router or switch crashes), or obstruction/destruction of communications paths.

Masquerade

Space segment, ground segment

A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity.

If an external entity can masquerade as a spacecraft operator; unauthorized commands could be transmitted to the spacecraft resulting in damage, data loss, or loss of amission.

21 Adapted from CCSDS 350.1-G-2 Security Threats Against Space Missions

Page 22: CubeSAT Cybersecurity Challenge Presentation Title

High-Level Threats Against Satellites

Threat Applicability Description Example

Replay Space segment, ground segment, space-link communications

An attack in which a valid data transmission is maliciously or fraudulently repeated, either by the originator or by a third party who intercepts the data and retransmits it, possibly as part of a masquerade attack.

If the replayed commands are not rejected, they could result in a duplicate spacecraft operation such as a maneuver burn or a spacecraft reorientation with the result that a spacecraft is in an unintended orientation.

Software threats

Space segment, ground segment

Misconfigurations, programming errors, installation of malicious/unvetted software, and exploitation of vulnerabilities by threat agents.

Loss of data, loss of spacecraftcontrol, unauthorized spacecraft control, or loss of mission.

22Adapted from CCSDS 350.1-G-2 Security Threats Against Space Missions

Page 23: CubeSAT Cybersecurity Challenge Presentation Title

High-Level Threats Against Satellites

Threat Applicability Description Impact Example

Supply Chain

Space Segment, Ground Segment

Attack in which extra electronic/electrical components to Printed Circuit Boards (PCBs) schematics or layouts. Malicious firmware is added to embedded systems’ microelectronic devices

Covert control of the power controller of the system management bus (SMBus) of a PCB would allow a threat agent to interfere with the communications of ground segment systems and space system sensors.

23

Page 24: CubeSAT Cybersecurity Challenge Presentation Title

Introduction to Attack Trees

24

• Start with a Goal

• Ask yourself “how”?

• Establish sub-goals (branches)

• Ask “how” again

• List the mechanisms to achieve the

sub-goal (leaves)

• Think about concurrent

requirements (AND

Statements)

• Think about alterative paths

(OR Statements)

Page 25: CubeSAT Cybersecurity Challenge Presentation Title

Attack Tree Methodology

25

G. Falco, A. Viswanathan, C. Caldera and H. Shrobe, "A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart

Cities," in IEEE Access, vol. 6, pp. 48360-48373, 2018, doi: 10.1109/ACCESS.2018.2867556.

Page 26: CubeSAT Cybersecurity Challenge Presentation Title

Attack Tree Template

26

When in

the

attack

process?

Where do

you

attack?

What is

the action?

How do

you

achieve

the action?

Reconnaissance (gather info)

Weaponization(prepare the weapon)

Deliver(get the weapon to

target)

Exploit(get into the system)

Control(manage the system)

Execute(achieve primary

goal)

Maintain(persistence)

Attacker Goal

Attack Surface (e.g. web interface, user, administrative panel, etc,)

Tools

Action (e.g. gain access, collect, edit, delete, etc.)

Page 27: CubeSAT Cybersecurity Challenge Presentation Title

CubeSAT User Interface Demo Video

27

Page 28: CubeSAT Cybersecurity Challenge Presentation Title

Section 3: Attacking CubeSATs -Generating Attack Trees for CubeSATs

Interactive Session

Page 29: CubeSAT Cybersecurity Challenge Presentation Title

Sci_Zone LinkStar-QuickSAT Architecture: Review

29

• QuickSAT/VMS is the web

based inteface

• Communication is via

"bent-pipe" to the ground

• Architecture supports a

range of radios including

the LinkStar-TRK

(simplex) and LinkStar-D

(duplex) plus S-Band, etc.

• The satellite "pushes" and

"pulls" data to and from

the ground. The ground

terminals cannot push

data to the satellite

Page 30: CubeSAT Cybersecurity Challenge Presentation Title

Interactive Attack Tree Generation

Page 31: CubeSAT Cybersecurity Challenge Presentation Title

Section 3: Attacking CubeSATs - Demo

Page 32: CubeSAT Cybersecurity Challenge Presentation Title

Demo Scenarios

⮚ Scenario 1 – Create a Denial of Service / Annoyance for the CubeSAT operators

⮚ Scenario 2 – Modify data being sent by the CubeSAT

⮚ Scenario 3 – Upload a malicious application to the CubeSAT to kill the radio

32

Page 33: CubeSAT Cybersecurity Challenge Presentation Title

CubeSAT Attack Demo Videos

33

Page 34: CubeSAT Cybersecurity Challenge Presentation Title

Attack Tree – Scenario 1

34 Please download higher resolution PDF of attack tree from https://www.sci-zone.com/cubesat-cybersecurity-challenge

Page 35: CubeSAT Cybersecurity Challenge Presentation Title

Attack Tree – Scenario 2

35 Please download higher resolution PDF of attack tree from https://www.sci-zone.com/cubesat-cybersecurity-challenge

Page 36: CubeSAT Cybersecurity Challenge Presentation Title

Attack Tree – Scenario 3

36 Please download higher resolution PDF of attack tree from https://www.sci-zone.com/cubesat-cybersecurity-challenge

Page 37: CubeSAT Cybersecurity Challenge Presentation Title

Section 4: Mitigations Discussion

Page 38: CubeSAT Cybersecurity Challenge Presentation Title

Mitigation

⮚ General risk management practices are encouraged

⮚ Safety systems on satellites can be adapted for security

⮚ Standards bodies are increasingly issuing guidance on satellite security (NIST PNT Profile)

⮚ Cybersecurity Principles for Space Systems are documented in both academic literature and national policy (SPD-5)

Page 39: CubeSAT Cybersecurity Challenge Presentation Title

Section 5: Lessons Learned Discussion

Page 40: CubeSAT Cybersecurity Challenge Presentation Title

Lesson Learned

⮚ CubeSATs are IoT's in space!

⮚ Despite cubesats being small, they are still highly calibrated machines that are sensitive to attack

⮚ The types of attacks against cubesats are not significantly different than attacks on other cyber-physical control systems

⮚ Traditional health monitors for satellites can be used to evaluate security of the cubesat as well

Page 41: CubeSAT Cybersecurity Challenge Presentation Title

Section 6: Homework Hackathon

Page 42: CubeSAT Cybersecurity Challenge Presentation Title

Test Servers to "Hacking"

⮚ Virtual Machines will be setup on the sci_Zone QuickSAT cloud environment for testing and exploring at https://www.sci-zone.com/cybersecurity-sandbox

⮚ Probe, explore, push, and "hack" the environment!

⮚ You will need to request access from [email protected]

⮚ Feedback from participants is welcome!

⮚ Results will be shared with the AIAA Community

42

Page 43: CubeSAT Cybersecurity Challenge Presentation Title