| CARVIEW |
SpaceSec 2026
4th Workshop on the Security of Space and Satellite Systems
Co-located with the NDSS Symposium
23 February 2026
In recent years, the number of satellites in orbit has surged dramatically, driven by the deployment of large-scale mega-constellations such as Starlink and OneWeb. Current projections estimate that more than 100,000 satellites will be launched in the coming decade, positioning satellite communication as a critical backbone of both consumer services and essential infrastructures.
Space-based systems are now providing a wide array of vital societal functions—ranging from global navigation and positioning, to telecommunication, Earth observation, and IoT connectivity. Yet, their central role in modern infrastructure also makes them highly attractive targets for cyber attacks. This risk is not theoretical: the attack on ViaSat during the early stages of the war in Ukraine and persistent disruptions of Global Navigation Satellite Systems (GNSS) worldwide highlight the tangible threats facing the domain.
Concerns about the cybersecurity of satellite systems have circulated since the mid-2000s, echoed in both academic research and hacker communities. Recent publications at leading security venues have reignited these debates, demonstrating that many long-standing vulnerabilities remain unresolved—and are now magnified by the unprecedented scale of satellite deployment. This raises a pressing question: why do these issues persist, despite years of awareness?
The answer lies, at least in part, in the unique nature of the space environment. The constraints of satellite design, deployment, and operation introduce challenges unlike those found in terrestrial systems. Addressing them requires novel approaches and interdisciplinary research at the intersection of space systems and cybersecurity.
Important Dates
| Paper Submission Deadline | |
| Notification of Acceptance | 16 December 2025 (AoE) |
| Workshop Date | 23 February 2026 (Pacific Standard Time) |
| Camera Ready Submission |
Accepted Papers
-
Accepted Long Papers
-
Porting NASA's core Flight System to the Formally Verified seL4 Microkernel
Juliana Furgala, Samuel Jero, Andrea Lin, Rick Skowyra (MIT Lincoln Laboratory)
-
Risk Assessment for ML-Based Applications in Satellite Systems
Simon Shigol, Roy Peled, Avishag Shapira, Yuval Elovici, Asaf Shabtai (Ben Gurion University of the Negev)
-
Orbital Escalation: Modeling Satellite Ransomware Attacks Using Game Theory
Efrén López-Morales (New Mexico State University)
-
The 1-RTT Penalty: Quantifying the Recurring Cost of PQC Fragmentation in LEO Handovers and ISLs
Young Eun Kwon, Ji Won Yoon (Korea University)
-
LighTellite: Reinforcement Learning-Based Framework for Energy Efficient Onboard Satellite Anomaly Detection
Aviel Ben Siman Tov, Edita Grolman, Yuval Elovici, Asaf Shabtai (Ben Gurion University of the Negev)
-
The Compromised Satellite Peripheral Dilemma
Rachel McAmis, Connor Willison, Richard Skowyra, Samuel Mergendahl (MIT Lincoln Laboratory)
-
Why is Space Cybersecurity Unique?
Rajiv Thummala, Gregory Falco (Cornell University)
-
Towards automated threat modeling for space systems via SPARTA matrix
Joonhyuk Park, Jiwon Kwak, Geunwoo Baek, Dohee Kang, Seungjoo Kim (School of Cybersecurity, Korea University)
-
One Small Patch for a File, One Giant Leap for OTA Updates
Julian Rederlechner, Ulysse Planta, Ali Abbasi (CISPA Helmholtz Center for Information Security)
-
Observing Starlink with Accessible Tools: An Empirical Experience Study of LEO Downlinks
Dongpyeong Seo, Jaewoo Park, Hocheol Nam, Min Suk Kang (KAIST)
-
Accepted Short Papers
-
Self-Organizing Resilience for Long-Term Threat Adaptation in Neuromorphic Space Systems
Sylvester Kaczmarek (Imperial College London)
-
Temporal Risk on Satellites
Shiqi Liu, Kun Sun (Center for Secure Information Systems, George Mason University)
-
Accepted Posters
-
PCDR: Probabilistic Chunk-Dispersed Routing for Mitigating Link-Flooding Attack in LSN
Hyeon-Min Choi, Jae-Hyeon Park, Eun-Kyu Lee (Incheon National University)
-
Secure and Scalable Rerouting in LEO Satellite Networks
Lyubomir Yanev, Pietro Ronchetti (ETH Zurich); Joshua Smailes (University of Oxford); Martin Strohmeier (armasuisse)
-
Securing Relay Satellite System: Direct MAC Transmission by Superposition Coding
SeyedMohammad Kashani, Branden Lloyd Buhler, Sang Kim, Ashfaq Khokhar (Iowa State University)
-
Challenges in Applying COTS Secure, Resilient Boot and Update Capabilities for Space Systems
Gabriel Torres, Raymond Govotski, Samuel Jero, Richard Skowyra, Samuel Mergendahl (MIT Lincoln Laboratory); Gruia-Catalin Roman (University of New Mexico); Joseph Trujilo (Air Force Research Laboratory Space Vehicles Directorate)
-
Crowdsourcing and Mapping COSPAS-SARSAT 406MHz Distress Beacons (Short Paper)
Ahsan Saleem, Andrei Costin (University of Jyväskylä, Finland); Guillermo Suarez-Tangil (IMDEA Networks Institute Madrid, Spain)
-
From Earth to Orbit: A Quantum-Secure Authentication Key-Establishment Mechanism to Defend Satellite Communications in the Quantum Age
Salman Shamshad, Waqas Bin Abbas, Sana Belguith, Lucy Berthoud (University of Bristol, Bristol, United Kingdom)
Call for Papers
The scope of SpaceSec covers all systems that are directly or indirectly connected to, or dependent on, space and satellite infrastructures. This includes communication links (satellite–ground and satellite–satellite), the ground segment (such as ground stations and terrestrial systems relying on satellite communications), and the space segment (including satellites and launch vehicles). We also consider the broad ecosystem of applications, use cases, and dependencies built upon satellite services. While all orbital regimes are of interest, particular emphasis is placed on research related to modern Low Earth Orbit (LEO) mega-constellations.
SpaceSec welcomes security contributions that demonstrate clear relevance to space and satellite systems and applications. Topics of interest include, but are not limited to:
Space Systems Security
- Small Satellite and CubeSat Security
- Ground/User Segment Attacks and Vulnerabilities
- Legacy Space System Security Analysis
- Space System Security Testbeds
- Measurement Infrastructure and Data Collection of Space Mission Security Data
- Security of Launch Vehicles and Launch Processes
- GNSS Attack and Defense Mechanisms
- Security of Space Situational Awareness (SSA) Technologies
- Data- and ML-driven Security of Space Missions
- Secure Satellite Software/Hardware Development
- Reverse Engineering and Tampering of Space and Ground Segments
- Side-Channels and Fault Attacks on Space- or User Segment Devices
- In-Orbit Intrusion Detection
Communications Security
- Satellite Link Jamming and Spoofing
- Securing and Attacking Inter-Satellite Links
- Optical Satellite Communication Security
- (Post-quantum) Cryptography for Space Communications
- LEO Constellation Routing Security
- Secure Optimized Satellite Communication Protocols (e.g., PEPs, QUIC)
- Key Management for (LEO) Constellations and Space Systems
Privacy and Usability
- Localization and Anonymity in Satellite Networks
- Privacy Issues in Satellite Communication
- Ethical Aspects of Satellite Security
- Usability of Existing Space Software and Standards
Space Security Strategies
- Economics of Space Security
- Game Theory-based Security Analysis Approaches
- Red Teaming and Blue Teaming in Space
- Supply Chain Security for Space Mission Components
- Forensics in Space Security Incidents
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper types are welcome:
Short Paper: Maximum 4 pages. Short papers should provide enough context for the reader to understand the contribution. Preliminary work is encouraged but not required.
Long Paper: Maximum 8 pages. Traditional research papers.
Submissions should follow the double-column NDSS format. Page limits exclude the bibliography and appendices, which can be up to 2 pages for long papers and 1 page for short papers.
We invite submissions in the following categories:
- Research Paper: A novel contribution in line with the topics of interest.
- Position Paper: New or provocative ideas of interest to the satellite and space communities.
- Experience Paper: Lessons learned from experiments or deployments.
- Preliminary Work Paper: Early results from interesting and new ideas.
- Extended Work Paper: Unpublished aspects of previously published work.
Anonymization and the Review Process: The review process is double-blind. All submissions should be anonymized.
Publication: SpaceSec26 proceedings will be published post-conference with the NDSS 2026.
Further Notes: At least one author of each accepted paper must register for the workshop and present the paper. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism are prohibited.
Organization
TPC and General Co-Chairs
Vincent Lenders, University of Luxembourg (LUX), vincent.lenders@uni.lu
Gunes Karabulut Kurt, Polytechnique Montréal (CA), gunes.kurt@polymtl.ca
Steering Committee
- Vincent Lenders, University of Luxembourg (LUX)
- Ivan Martinovic, University of Oxford (UK)
- Christina Pöpper, NYU Abu Dhabi (UAE)
- Knut Eckstein, European Space Agency (Europe)
- Martin Strohmeier, Cyber-Defence Campus, armasuisse (CH)
- Johannes Willbold, Ruhr University Bochum (DE)
- Samuel Jero, MIT Lincoln Lab (USA)
- Aanjhan Ranganathan, Northeastern University (USA)
Web Chair
Simon Birnbach, University of Oxford (UK), simon.birnbach@cs.ox.ac.uk
Publicity Chair
Jessie Hamill-Stewart, University of Bath and University of Bristol (UK), jessie.hamill-stewart@bristol.ac.uk
Program Committee
- Ali Abbasi, CISPA Helmholtz Center for Information Security
- Antonios Atlasis, European Space Agency
- Christoph Bader, European Space Agency
- Brandon Bailey, The Aerospace Corporation
- Olfa Ben Yahia, Polytechnique Montréal
- Simon Birnbach, University of Oxford
- Yueqi Chen, University of Colorado Boulder
- Bruce DeBruhl, California Polytechnic State University, San Luis Obispo
- Knut Eckstein, European Space Agency
- Gregory Falco, Cornell University
- Daniel Fischer, European Space Agency
- Giacomo Giuliari, Mysten Labs
- Andreas Hein, University of Luxembourg
- Stephen Herwig, William & Mary
- Eric Jedermann, RPTU Kaiserslautern-Landau
- Samuel Jero, MIT Lincoln Lab
- Sebastian Köhler, University of Oxford
- Patrick Lin, California Polytechnic State University
- Ulf Lindqvist, SRI
- Mark Manulis, Universität der Bundeswehr München
- Ivan Martinovic, University of Oxford
- James Pavur, Cysec Labs
- Christina Pöpper, NYU Abu Dhabi
- Aanjhan Ranganathan, Northeastern University
- Harshad Sathaye, ETH Zürich
- Stephen Schwab, USC Information Sciences Institute
- Mridula Singh, CISPA Helmholtz Center for Information Security
- Georgios Smaragdakis, TU Delft
- Martin Strohmeier, Cyber-Defence Campus, armasuisse Science & Technology
- Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
- Howard Weiss, Parsons, Inc.
- Johannes Willbold, Ruhr University Bochum
- Simay Yilmaz, Izmir Katip Celebi University