date: 2025-02-28
previous note: [[1011.2 Cyber Security Satellite Research]]
related note(s):
-
tags: #software-bus #satellite-cyber-attack #satellite-software
# Software Bus Network Vulnerabilities
Schalk, Brodnik, and Brown collected data via their testing of a simulated satellite network using NASA's open source and widely popular cFS framework. With some Python programming and computer architecture familiarity they were able to [[1011.2.3.3 Simulated Cyber Attack on Satellite Network|exploit and attack simulated satellite networks]] that currently several government, military, and commercial launch providers and satellite operators use (Schalk et al., 2022, p. 351). Their findings included exploiting the [[1011.2.3.1 Single Component Reliability in Software Bus|single component reliability in the software bus]] and [[1011.2.3.2 Lack of Software Bus Permissions and Encryption|lack of permissions and encryption between applications]].
---
## References
1. [[Analysis of Vulnerabilities in Satellite Software Bus Network Architecture]]