{"id":106905,"date":"2020-09-30T21:01:49","date_gmt":"2020-10-01T04:01:49","guid":{"rendered":"\/blogs\/?p=106905"},"modified":"2024-07-09T02:24:24","modified_gmt":"2024-07-09T09:24:24","slug":"securing-space-4-0-one-small-step-or-a-giant-leap-part-2","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/","title":{"rendered":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2"},"content":{"rendered":"<p><em>McAfee Advanced Threat Research (ATR) is collaborating with <\/em><a href=\"https:\/\/www.cit.ie\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Cork Institute of Technology<\/em><\/a><em> (CIT) and its <\/em><a href=\"https:\/\/www.bco.ie\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Blackrock Castle Observatory<\/em><\/a><em> (BCO) and the <\/em><a href=\"http:\/\/nationalspacecentre.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>National Space Center<\/em><\/a><em> in Cork, Ireland<\/em><\/p>\n<p>In the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">first of this two-part blog series<\/a> we introduced Space 4.0, its data value and how it looks set to become the next battleground in the defense against cybercriminals. In part two we discuss the architectural components of Space 4.0 to threat model the ecosystem from a cybersecurity perspective and understand what we must do to secure Space 4.0 moving forward.<\/p>\n<h2>Nanosats: Remote Computers in Space<\/h2>\n<p>A satellite is composed of a <a href=\"https:\/\/www.slideshare.net\/chlick420\/satellite-hacking\" target=\"_blank\" rel=\"noopener noreferrer\">payload and a bus<\/a>. The payload is the hardware and software required for the mission or satellite\u2019s specific function, such as imaging equipment for surveillance. The bus consists of the infrastructure or platform that houses the payload, such as thermal regulation and command and control. <a href=\"https:\/\/www.nasa.gov\/content\/what-are-smallsats-and-cubesats\" target=\"_blank\" rel=\"noopener noreferrer\">Small satellites<\/a> are space craft typically weighing less than 180 kilograms and, within that class of satellites, is what we call nanosatellites or nanosats which typically weigh between 1-10 kilograms. Cubesats are a class of nanosat so you will often hear the term used interchangeably, and for the context of Space 4.0 security, we can assume they are the same device. Nanosats significantly reduce launch costs due to their small size and the fact that many of these devices can be mounted on board a larger single satellite for launch.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Commercial_off-the-shelf\" target=\"_blank\" rel=\"noopener noreferrer\">Commercial off-the-shelf<\/a> (COTS) Cubesats typically use free open source software such as FreeRTOS or KubOS for the on-board operating system. However, other systems are possible, with drivers available for most of the hardware on Linux and Windows OS. <a href=\"https:\/\/www.kubos.com\/kubos\/\" target=\"_blank\" rel=\"noopener noreferrer\">KubOS<\/a> is an open source flight software framework for satellites and has cloud-based mission control software, <a href=\"https:\/\/www.kubos.com\/majortom\/\" target=\"_blank\" rel=\"noopener noreferrer\">Major Tom<\/a>, to operate nanosats or a constellation. We mention KubOS here as it is a good example of what the current Space 4.0 operating model looks like today. While we have not reviewed KubOS from a security perspective, developing a secure framework for satellites is the right path forward, allowing mission developers to focus on the payload.<\/p>\n<p>Some of the use cases available with Cubesats are:<\/p>\n<ol>\n<li>File transfers<\/li>\n<li>Remote communication via uplink\/downlink<\/li>\n<li>Intra-satellite and inter-satellite communications<\/li>\n<li>Payload services such as camera and sensors telemetry<\/li>\n<li>Software Updates<\/li>\n<\/ol>\n<p>KubOS is \u201ccreating a world where you can operate your small satellite from your web browser or iPhone\u201d. <a href=\"https:\/\/www.prweb.com\/releases\/2018\/02\/prweb15172919.htm\" target=\"_blank\" rel=\"noopener noreferrer\">KubOS<\/a>\u2019 <a href=\"https:\/\/www.prweb.com\/releases\/2018\/02\/prweb15172919.htm\" target=\"_blank\" rel=\"noopener noreferrer\">objective<\/a> is to allow customers to send bits and not rockets to space and it is defining a new era of software-designed satellites. The satellite model is changing from relay type devices to remote computers in space using COTS components and leveraging TCP\/IP routing capabilities. This model shift also means that there is more software executing on these satellites and more complex payload processing or interaction with the software stack and hence more attack surface.<\/p>\n<p>To date, attacks on satellite systems from a cybersecurity perspective have typically been in the context of VSAT terminals, eavesdropping and hijacking. While there have been vulnerabilities found in the VSAT terminal software and its higher-level custom protocols, there seems to have been no focus and vulnerabilities discovered within the network software stack of the satellite itself. This may be since satellites are very expensive, as well as closed source, so not accessible to security researchers or cybercriminals, but this security by obscurity will not provide protection with the new era of nanosats. Nanosats use COTS components which will be accessible to cybercriminals.<\/p>\n<p>Due to the closed nature of satellites there has not been much published on their system hardware and software stack. However, the <a href=\"https:\/\/public.ccsds.org\/Publications\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Consultative Committee for Space Data Systems (CCSDS)<\/a>, which develops standards and specifications including protocols for satellite communications, does give some insight. The <a href=\"https:\/\/public.ccsds.org\/Publications\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">CCSDS technical domains<\/a> are:<\/p>\n<ol>\n<li>Space Internetworking Services<\/li>\n<li>Mission Ops. And Information Management Services<\/li>\n<li>Spacecraft Onboard Interface Services<\/li>\n<li>System Engineering<\/li>\n<li>Cross Support Services<\/li>\n<li>Space Link Services<\/li>\n<\/ol>\n<p>The CCSDS standards are divided into color codes to represent recommended standards and practices versus informational and experimental. This is a very large source of data communications for satellite designers to aid them in a reference for implementation. However, as we have observed over the cyber threat landscape of the past few decades, secure standards and specifications for hardware, software and protocols do not always translate to secure implementation. The CCSDS defines a TCP\/IP stack suitable for transmission over space datalinks as per figure 1 below. Satellites that become more connected, just like any other device on the internet, their network and protocol software stack will become more accessible and targeted. As we discussed in part 1 &lt;insert link&gt; of our Space 4.0 blog series, there have been many TCP\/IP and remote protocol related vulnerabilities in both embedded devices and even state of the art operating systems such as Windows 10. The TCP\/IP stack and remote protocol implementations are a common source of vulnerabilities due to the complexities of parsing in unsafe memory languages such as C and C++. There does not appear to be any open source implementations of the CCSDS TCP\/IP protocol stack.<\/p>\n<p><strong>Figure 1 \u2013 CCSDS <\/strong><strong>Space communications protocols reference model<\/strong><\/p>\n<p>The <a href=\"https:\/\/bytebucket.org\/bbruner0\/albertasat-on-board-computer\/wiki\/1.%20Resources\/1.1.%20DataSheets\/CSP\/GS-CSP-1.1.pdf?rev=316ebd49bed49fdbb1d74efdeab74430e7cc726a\" target=\"_blank\" rel=\"noopener noreferrer\">CubeSat Protocol<\/a> (CSP) is a free open source TCP\/IP stack implementation for communication over space datalinks, similar to the CCSDS TCP\/IP stack. The <a href=\"https:\/\/github.com\/libcsp\/libcsp\" target=\"_blank\" rel=\"noopener noreferrer\">CSP protocol library<\/a> is implemented in C, open source and implemented in many Cubesats that have been deployed to space. The protocol can be used for communication from ground station to satellite, inter-satellite and the intra-satellite communication bus. There have been <a href=\"https:\/\/eyalitkin.wordpress.com\/2016\/11\/04\/cves-publication-libcsp\/\" target=\"_blank\" rel=\"noopener noreferrer\">3 vulnerabilities<\/a> to date reported in this protocol.<\/p>\n<p>Figure 2 below shows what a Cubesat architecture looks like from a trust boundary perspective relative to the satellite and other satellites within the constellation and the earth.<\/p>\n<p><strong>Figure 2<\/strong> \u2013 Space LEO Cubesat architecture trust boundaries<\/p>\n<p>No hardware, software, operating system or protocol is completely free of vulnerabilities. What is important from a security perspective is:<\/p>\n<ol>\n<li>The accessibility of the attack surface<\/li>\n<li>The motives and capabilities of the adversary to exploit an exposed vulnerability if present in the attack surface<\/li>\n<\/ol>\n<p>As these low-cost satellites get launched in our LEO and become more connected, any exposed technology stack will become increasingly targeted by cybercriminals.<\/p>\n<h2>Space 4.0 Threat Modeling<\/h2>\n<p>This Space 4.0 threat model focuses on the cybercriminal and how they can exploit Space 4.0 data for monetization. The <a href=\"https:\/\/espas.secure.europarl.europa.eu\/orbis\/sites\/default\/files\/generated\/document\/en\/Report_29_Space_and_Security_online.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">following Space 4.0 factors<\/a> will make it more accessible to cybercriminals:<\/p>\n<ol>\n<li>Mass deployment of small satellites to LEO<\/li>\n<li>Cheaper satellites with COTS components and increased satellite on board software processing (no longer relay devices)<\/li>\n<li>Satellite service models, Ground Station-as-a-Service (GSaaS) and Satellite-as-a-Service (SataaS) and shared infrastructure across government, commercial and academic<\/li>\n<li>Satellite connectivity and networks in space (ISL \u2013 inter-satellite links)<\/li>\n<li>Space 4.0 data value<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.slideshare.net\/chlick420\/satellite-hacking\" target=\"_blank\" rel=\"noopener noreferrer\">Space security has typically been analyzed<\/a> from the perspective of ground segment, communications or datalink and space segment. Additionally, the attack classes have been categorized as electronic (jamming), eavesdropping, hijacking and control. Per figure 3 below, we need to think about Space 4.0 with a cybersecurity approach due to the increased connectivity and data, as opposed to the traditional approach of ground, communication and space segments. Cybercriminals will target the data and systems as opposed to the RF transmission layer.<\/p>\n<p><strong>Figure 3<\/strong> \u2013 Space 4.0 threat modeling architecture<\/p>\n<p>It is important to consider the whole interconnectivity of the Space 4.0 ecosystem as cybercriminals will exploit any means possible, whether that be direct or indirect access (another trusted component). Open source networked ground stations such as <a href=\"https:\/\/satnogs.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SatNOGs<\/a> and the emerging <a href=\"https:\/\/www.wired.com\/story\/nyansat-open-source-satellite-tracker\/\" target=\"_blank\" rel=\"noopener noreferrer\">NyanSat<\/a> are great initiatives for space research but we should consider these in our overall threat model as they provide mass connectivity to the internet and space.<\/p>\n<p>The traditional space security model has been built on a foundation of cost as a barrier to entry and perimeter-based security due to lack of physical access and limited remote access to satellites. However, once a device is connected to the internet the threat model changes and we need to think about a satellite as any other device which can be accessed either directly or indirectly over the internet.<\/p>\n<p>In addition, if a device can be compromised in space remotely or through the supply chain, then that opens a new attack class of space to cloud\/ground attacks.<\/p>\n<p>Users and trusted insiders will always remain a big threat from a ground station perspective, just like enterprise security today, as they can potentially get direct access to the satellite control.<\/p>\n<p>The movement of ground services to the cloud is a good business model if designed and implemented securely, however a compromise would impact many devices in space being controlled from the GSaaS. It is not quite clear where the shared responsibility starts and ends for the new SataaS and GSaaS Space 4.0 service models but the satellite key management system (KMS), data, GSaaS credentials and analytics intellectual property (this may reside in the user\u2019s environment, the cloud or potentially the satellite but for the purposes of this threat model we assume the cloud) will be much valued assets and targeted.<\/p>\n<p>From the Cyber and Space Threat Landscape review in part 1 &lt;insert link&gt;, combined with our understanding of the Space 4.0 architecture and attack surfaces, we can start to model the threats in Table 1 below.<\/p>\n<p><strong>Table 1<\/strong> \u2013 Space 4.0 threats, attack classes and layers, and attack vectors<\/p>\n<p>Based on the above threat model, let\u2019s discuss a real credible threat and attack scenario. From our Space cyber threat landscape review in part 1 of this blog series, there were attacks on ground stations in 2008 at the Johnson Space Center and for a Nasa research satellite. In a Space 4.0 scenario, the cybercriminal attacks the ground station through phishing to get access to satellite communications (could also be a supply chain attack to get a known vulnerable satellite system into space). The cybercriminal uses an exploit being sold on the underground to exploit a remote wormable vulnerability within the space TCP\/IP stack or operating system of the satellite in space, just like we saw EternalBlue being weaponized by WannaCry. Once the satellite has been compromised the malware can spread between satellite vendors using their ISL communication protocol to propagate throughout the constellation. Once the constellation has been compromised the satellite vendor can be held to ransom, causing major disruption to Space 4.0 data and\/or critical infrastructure.<\/p>\n<h2>Moving Forward Securely for a Trustworthy Space 4.0 Ecosystem<\/h2>\n<p>Establishing a trustworthy Space 4.0 ecosystem is going to require strong collaboration between cyber threat research teams, government, commercial and academia in the following areas:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.cfr.org\/report\/cybersecurity-and-new-era-space-activities\" target=\"_blank\" rel=\"noopener noreferrer\">Governance and regulation<\/a> of security standards implementation and certification\/validation of satellite device security capabilities prior to launch<\/li>\n<li>Modeling the evolving threat landscape against the Space 4.0 technology advancements<\/li>\n<li>Secure reference architectures for end to end Space 4.0 ecosystem and data protection<\/li>\n<li>Security analysis of the CCSDS protocols<\/li>\n<li>Design of trustworthy platform primitives to thwart current and future threats must start with a security capable bill of materials (BOM) for both hardware and software starting with the processor then the operating system, frameworks, libraries and languages. Hardware enabled security to achieve confidentiality, integrity, availability and identity so that satellite devices may be resilient when under attack<\/li>\n<li>Visibility, detection and response capabilities within each layer defined in our Space 4.0 architecture threat model above<\/li>\n<li>Development of a MITRE ATT&amp;CK specifically for Space 4.0 as we observe real world incidents so that it can be used to strengthen the overall defensive security architecture using TTPs and threat emulation<\/li>\n<\/ol>\n<p>Space 4.0 is moving very fast with GSaaS, SataaS and talk of space data centers and high-speed laser ISL; security should not be an inhibitor for time to market but a contributor to ensure that we have a strong security foundation to innovate and build future technology on with respect to the evolving threat landscape. Space communication predates the Internet so we must make sure any legacy limitations which would restrict this secure foundation are addressed. As software complexity for on board processing and connectivity\/routing capability increases by moving to the edge (space device) we will see vulnerabilities within the Space 4.0 TCP\/IP stack implementation.<\/p>\n<p>This is a pivotal time for the secure advancement of Space 4.0 and we must learn from the mistakes of the past with IoT where the rush to adopt new and faster technology resulted in large scale deployment of insecure hardware and software. It has taken much effort and collaboration between Microsoft and the security research community since <a href=\"https:\/\/en.wikipedia.org\/wiki\/Trustworthy_computing\" target=\"_blank\" rel=\"noopener noreferrer\">Bill Gates announced the Trustworthy Computing initiative<\/a> in 2002 to arrive at the state-of-the-art Windows 10 OS with hardware enabled security. Likewise, we have seen great advancements on the IoT side with <a href=\"https:\/\/www.arm.com\/why-arm\/architecture\/platform-security-architecture\" target=\"_blank\" rel=\"noopener noreferrer\">ARM Platform Security Architecture<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sphere\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sphere<\/a>. Many security working groups and bodies have evolved since 2002, such as <a href=\"https:\/\/trustedcomputinggroup.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Trust Computing Group<\/a>, <a href=\"https:\/\/confidentialcomputing.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">Confidential Computing Consortium<\/a>, <a href=\"https:\/\/trustedconnectivityalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trusted Connectivity Alliance<\/a> and <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cloud\/what-is-zero-trust.html\">Zero Trust concept<\/a> to name a few. There are many trustworthy building block primitives today to help secure Space 4.0, but we must leverage at the concept phase of innovation and not once a device has been launched into space; the time is now to secure our next generation infrastructure and data source. Space security has not been a priority for governments to date but that seems all set to change with the \u201c<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2022\/01\/19\/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">Memorandum on Space Policy Directive-5\u2014Cybersecurity Principles for Space Systems<\/a>\u201d.<\/p>\n<p>We should pause here for a moment and recognize the recent efforts from the cybersecurity community to secure space, such as the <a href=\"https:\/\/www.orbitalsecurity.space\/about\" target=\"_blank\" rel=\"noopener noreferrer\">Orbital Security Alliance<\/a>, <a href=\"https:\/\/s-isac.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">S-ISAC<\/a>, <a href=\"https:\/\/www.forbes.com\/sites\/lorenthompson\/2020\/06\/12\/mantech-space-range-simulates-cyberattacks-on-satellites--ground-stations-to-bolster-defenses\/#3ab0d21140f7\" target=\"_blank\" rel=\"noopener noreferrer\">Mantech<\/a> and Defcon <a href=\"https:\/\/www.hackasat.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hack-a-Sat<\/a>.<\/p>\n<p><a href=\"https:\/\/spacenews.com\/kubos-and-ruag-partner-to-provide-computer-systems-for-megaconstellations\/\" target=\"_blank\" rel=\"noopener noreferrer\">KubOS is being branded<\/a> as the Android of space systems and we are likely to see a myriad of new software and hardware emerge for Space 4.0. We must work together to ensure Space 4.0 connectivity does not open our global connectivity and infrastructure dependency to the next Mirai botnet or WannaCry worm on LEO.<\/p>\n<p>McAfee would like to thank <a href=\"https:\/\/www.cit.ie\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cork Institute of Technology<\/a> (CIT) and its <a href=\"https:\/\/www.bco.ie\/\" target=\"_blank\" rel=\"noopener noreferrer\">Blackrock Castle Observatory<\/a> (BCO) and the <a href=\"http:\/\/nationalspacecentre.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Space Center<\/a> (NSC) in Cork, Ireland for their collaboration in our mission to secure Space 4.0.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and&#8230;<\/p>\n","protected":false},"author":1061,"featured_media":98318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5657,3576],"class_list":["post-106905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T04:01:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-09T09:24:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eoin Carroll, Christiaan Beek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@w3knight\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eoin Carroll, Christiaan Beek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\"},\"author\":{\"name\":\"Eoin Carroll\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\"},\"headline\":\"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2\",\"datePublished\":\"2020-10-01T04:01:49+00:00\",\"dateModified\":\"2024-07-09T09:24:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\"},\"wordCount\":2308,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\",\"name\":\"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg\",\"datePublished\":\"2020-10-01T04:01:49+00:00\",\"dateModified\":\"2024-07-09T09:24:24+00:00\",\"description\":\"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\",\"name\":\"Eoin Carroll\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"caption\":\"Eoin Carroll\"},\"description\":\"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/\",\"https:\/\/x.com\/w3knight\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog","description":"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog","og_description":"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-10-01T04:01:49+00:00","article_modified_time":"2024-07-09T09:24:24+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg","type":"image\/jpeg"}],"author":"Eoin Carroll, Christiaan Beek","twitter_card":"summary_large_image","twitter_creator":"@w3knight","twitter_site":"@McAfee","twitter_misc":{"Written by":"Eoin Carroll, Christiaan Beek","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/"},"author":{"name":"Eoin Carroll","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d"},"headline":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2","datePublished":"2020-10-01T04:01:49+00:00","dateModified":"2024-07-09T09:24:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/"},"wordCount":2308,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/","name":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg","datePublished":"2020-10-01T04:01:49+00:00","dateModified":"2024-07-09T09:24:24+00:00","description":"McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/AdobeStock_223200320.jpeg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/securing-space-4-0-one-small-step-or-a-giant-leap-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Securing Space 4.0 \u2013 One Small Step or a Giant Leap? Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d","name":"Eoin Carroll","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","caption":"Eoin Carroll"},"description":"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.","sameAs":["https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/","https:\/\/x.com\/w3knight"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/106905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=106905"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/106905\/revisions"}],"predecessor-version":[{"id":196263,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/106905\/revisions\/196263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/98318"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=106905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=106905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=106905"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=106905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}