Space odyssey: An experimental software security analysis of satellites

J Willbold, M Schloegel, M Vögele… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Satellites are an essential aspect of our modern society and have contributed significantly to
the way we live today, most notable through modern telecommunications, global positioning …

Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight

J Pavur, I Martinovic - Journal of Cybersecurity, 2022 - academic.oup.com
As the space industry approaches a period of rapid change, securing both emerging and
legacy satellite missions will become vital. However, space technology has been largely …

Sok: Building a launchpad for impactful satellite cyber-security research

J Pavur, I Martinovic - arXiv preprint arXiv:2010.10872, 2020 - arxiv.org
As the space industry approaches a period of rapid change, securing both emerging and
legacy satellite missions will become vital. However, space technology has been largely …

A {Large-scale} analysis of the security of embedded firmwares

A Costin, J Zaddach, A Francillon… - 23rd USENIX security …, 2014 - usenix.org
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …

[PDF][PDF] Building software securely from the ground up

AK Ghosh, C Howell, JA Whittaker - IEEE software, 2002 - academia.edu
As software professionals first and computer security researchers sec-ond, we believe that
most computer security articles published in industry magazines focus on fixing security …

When satellites attack: Satellite-to-satellite cyber attack, defense and resilience

G Falco - ASCEND 2020, 2020 - arc.aiaa.org
The United States is increasingly reliant on space systems for civil and military operations.
Therefore, it is no surprise that adversaries are interested in compromising these systems …

Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations

A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

From the ground up: The DIMACS software security workshop

G McGraw - IEEE Security & Privacy, 2003 - ieeexplore.ieee.org
The DIMACS Software Security Workshop held in New Jersey explored issues such as
security engineering, architecture and implementation risks, security analysis, mobile and …

Bridging the gap between software development and information security

KR Van Wyk, G McGraw - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Traditionally, software development efforts in large corporations have been about as far
removed from information security as they were from human resources or any other …