Extending the State of the Art on Satellite Reverse Engineering
Category: Vulnerability research
Location: Thun / Zurich
Contact:
Martin Strohmeier
In recent years, the CYD Campus and other researchers have found many vulnerabilities in satellite-based communication systems, illustrating a lack of security posture in the wider industry. This project will extend the analysis by looking directly at satellite communications hardware.
The project comprises building the tooling in order to conduct vulnerability research directly on the satellite hardware. The student will get familiar with and extend a generic emulation and fuzzing system to make it applicable to additional microcontroller-focused CPU architectures. Concretely, the student will implement a new hardware architecture/instruction set for the Unicorn engine [1].
We will provide you with the hardware and formware of various satellite platforms’ communication systems. The final goal is to analyze the firmware and possibly find security vulnerabilities in satellite firmware.
Required Skills:
- Interest in embedded systems firmware, fuzzing, program analysis and emulation technologies
- Programming in Python/C
- Some familiarity with at least one assembly language (ideally ARM, MIPS, PowerPC or SPARC)