
admits cyberattack. Cybernews. url:
https://cybernews.com/news/japan-jaxa-space-
agency-cyberattack/, Accessed: 24-09-2024.
Bl
´
azquez, E. (2021). GitHub - fakelib.sh: Simple
tool/script for generating malicious Linux shared li-
braries. url: https://github.com/eblazquez/fakelib.sh,
Accessed 24.09.2024.
Breda, P., Markova, R., Abdin, A., Jha, D., Carlo, A., and
Mantı, N. P. (2022). Cyber vulnerabilities and risks of
ai technologies in space applications. In 73rd Interna-
tional Astronautical Congress (IAC), Paris, France.
Corfield, G. (2023). Russian spy agencies
targeting Starlink with custom malware,
Ukraine warns. The Telegraph. url:
https://www.telegraph.co.uk/business/2023/08/12/russian-
spy-agencies-targeting-elon-musk-starlink-malware/,
Accessed: 24-09-2024.
Driouch, O., Bah, S., and Guennoun, Z. (2023). A holistic
approach to build a defensible cybersecurity architec-
ture for new space missions. New Space, 11(4):203–
218.
Falco, G. (2018). The vacuum of space cyber security. In
2018 AIAA SPACE and Astronautics Forum and Ex-
position, page 5275.
Falco, G. (2020). When satellites attack: Satellite-to-
satellite cyber attack, defense and resilience. In AS-
CEND 2020, page 4014.
Fowler, B. W. (2016). Cyber vulnerabilities in space sys-
tems. PhD thesis, Utica College.
Fu, P., Wu, J., Lin, X., and Shen, A. (2022). Ztei:
Zero-trust and edge intelligence empowered continu-
ous authentication for satellite networks. In GLOBE-
COM 2022-2022 IEEE Global Communications Con-
ference, pages 2376–2381. IEEE.
Gvozdev, O. and Vorobev, V. (2020). The concept of in-
formation infrastructure of a multi-satellite system for
earth remote sensing. International Multidisciplinary
Scientific GeoConference: SGEM, 20(2.2):275–283.
Han, R., Bai, L., Jiang, C., Liu, J., and Choi, J. (2021). A
secure architecture of relay-aided space information
networks. IEEE Network, 35(4):88–94.
Hasan, R. and Hasan, R. (2022). Towards a threat model and
security analysis of spacecraft computing systems. In
2022 IEEE International Conference on Wireless for
Space and Extreme Environments (WiSEE), pages 87–
92. IEEE.
Ieva (2024). How Many Satellites are in
Space? Kongsberg nanoavionics. url:
https://nanoavionics.com/blog/how-many-satellites-
are-in-space/, Accessed: 24-09-2024,.
Kavallieratos, G. and Katsikas, S. (2023). An exploratory
analysis of the last frontier: A systematic literature re-
view of cybersecurity in space. International Journal
of Critical Infrastructure Protection, page 100640.
Khamvilai, T. and Pakmehr, M. (2023). Zero trust avion-
ics systems (ztas). In 2023 IEEE/AIAA 42nd Digi-
tal Avionics Systems Conference (DASC), pages 1–8.
IEEE.
Lowdermilk, J. and Sethumadhavan, S. (2021). Towards
zero trust: An experience report. In 2021 IEEE Se-
cure Development Conference (SecDev), pages 79–85.
IEEE.
Office of Inspector General (2021). NASA’s Cyber-
security Readiness. Report IG-21-019 (A-20-009-
00), National Aeronautics and Space Administra-
tion. url: https://oig.nasa.gov/docs/IG-21-019.pdf,
Accessed 24.09.2024.
Open Source Zero Trust Networking (2023). Open-
Ziti - Open Source Zero trust Networking.
url:https://openziti.io/, Accessed 24.09.2024.
Orbiting now (2024). Active Satellite orbit data. Orbiting
now. url: https://orbit.ing-now.com/, Accessed: 24-
09-2024.
Protik, R. C. (2023). Updated standard for secure satellite
communications: Analysis of satellites, attack vec-
tors, existing standards, and enterprise and security ar-
chitectures. arXiv preprint arXiv:2310.19105.
Quiquet, F. (2023). Reaching for the Stars with Zero Trust:
Space Domain Applications.
Rose, S., Borchert, O., Mitchell, S., and Connelly, S.
(2020). Zero trust architecture. NIST Special Publica-
tion 800-207, National Institute of Science and Tech-
nology.
Schalk, A. and Brown, D. (2023). Detection and mitigation
of vulnerabilities in space network software bus archi-
tectures. In 2023 IEEE Aerospace Conference, pages
1–10. IEEE.
Singh, K. J. (2023). The first satellite hacking by
Russian hackers to Ukraine. Linkedin. url:
https://www.linkedin.com/pulse/first-satellite-
hacking-russian-hackers-ukraine-kamal-jeet-singh-
jjdic/, Accessed: 24-09-2024,.
Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig,
Z., and Doss, R. (2022). Zero trust architecture (zta):
A comprehensive survey. IEEE Access, 10:57143–
57179.
Thangavel, K., Plotnek, J. J., Gardi, A., and Sabatini, R.
(2022). Understanding and investigating adversary
threats and countermeasures in the context of space
cybersecurity. In 2022 IEEE/AIAA 41st Digital Avion-
ics Systems Conference (DASC), pages 1–10. IEEE.
Unal, B. (2019). Cybersecurity of NATO’s Space-based
Strategic Assets. Chatham House. The Royal Institute
of International Affairs.
White, E. and White, E. (2024). A zero-trust approach to
space cybersecurity could be the answer.
Zatti, S. (2020). Space and cyber threats. Handbook of
Space Security: Policies, Applications and Programs,
pages 245–263.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
140