Simon Birnbach
YOU?
Author Swipe
View article: DSNS: The Deep Space Network Simulator
DSNS: The Deep Space Network Simulator Open
Simulation tools are commonly used in the development and testing of new protocols or new networks. However, as satellite networks start to grow to encompass thousands of nodes, and as companies and space agencies begin to realize the inte…
View article: Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System Open
In recent years, numerous sophisticated malware detection systems have been proposed, many of which are based on machine learning. Though such systems attain impressive results, they are often designed having effectiveness as the main, if …
View article: KeySpace: Enhancing Public Key Infrastructure for Interplanetary Networks
KeySpace: Enhancing Public Key Infrastructure for Interplanetary Networks Open
As the use of satellites continues to grow, new networking paradigms are emerging to support the scale and long distance communication inherent to these networks. In particular, interplanetary communication relays connect distant network s…
View article: Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks Open
In the wake of increasing numbers of attacks on radio communication systems,\na range of techniques are being deployed to increase the security of these\nsystems. One such technique is radio fingerprinting, in which the transmitter\ncan be…
View article: Model Weights for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting"
Model Weights for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting" Open
Model weights for use with the SatIQ fingerprinting models used in the paper “Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting”. The models are used to authenticate Iridium satellites from hig…
View article: Model Weights for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting"
Model Weights for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting" Open
Model weights for use with the SatIQ fingerprinting models used in the paper “Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting”. The models are used to authenticate Iridium satellites from hig…
View article: Dataset for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting"
Dataset for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting" Open
Labelled dataset of Iridium “ring alert” downlink messages, including message headers captured at 25MS/s. Message metadata includes satellite and transmitter identifier, satellite position, timestamp, and estimated noise level. The dataset…
View article: Dataset for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting"
Dataset for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting" Open
Labelled dataset of Iridium “ring alert” downlink messages, including message headers captured at 25MS/s. Message metadata includes satellite and transmitter identifier, satellite position, timestamp, and estimated noise level. The dataset…
View article: Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting Open
Due to an increase in the availability of cheap off-the-shelf radio hardware,\nspoofing and replay attacks on satellite ground systems have become more\naccessible than ever. This is particularly a problem for legacy systems, many\nof whic…
View article: POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft
POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft Open
Recent years have seen a rapid increase in the number of CubeSats and other small satellites in orbit - these have highly constrained computational and communication resources, but still require robust secure communication to operate effec…
View article: Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal Open
Satellite user terminals are a promising target for adversaries seeking to target satellite communication networks. Despite this, many protections commonly found in terrestrial routers are not present in some user terminals. As a case stud…
View article: Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing
Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing Open
Data from Earth Observation satellites has become crucial in private enterprises, research applications, and in coordinating national responses to events such as forest fires.These purposes are supported by data derived from a variety of s…
View article: RingAuth: Wearable Authentication using a Smart Ring
RingAuth: Wearable Authentication using a Smart Ring Open
In this paper, we show that by using inertial sensor data generated by a smart ring, worn on the finger, the user can be authenticated when making mobile payments or when knocking on a door (for access control). The proposed system can be …
View article: RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Open
Network analysis and machine learning techniques have been widely applied for building malware detection systems. Though these systems attain impressive results, they often are $(i)$ not extensible, being monolithic, well tuned for the spe…
View article: BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments
BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments Open
The lack of standard input interfaces in the Internet of Things (IoT) ecosystems presents a challenge in securing such infrastructures. To tackle this challenge, we introduce a novel behavioral biometric system based on naturally occurring…
View article: They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors Open
In this paper, we describe how the electronic rolling shutter in CMOS image sensors can be exploited using a bright, modulated light source (e.g., an inexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We demonstra…
View article: They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in\n CMOS Image Sensors
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in\n CMOS Image Sensors Open
In this paper, we describe how the electronic rolling shutter in CMOS image\nsensors can be exploited using a bright, modulated light source (e.g., an\ninexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We\ndemons…