Security Challenges of Complex Space Applications: An Empirical Study

Tomas Paulik
2024-08-15
Abstract:Software applications in the space and defense industries have their unique characteristics: They are complex in structure, mission-critical, and often targets of state-of-the-art cyber attacks sponsored by adversary nation states. These applications have typically a high number of stakeholders in their software component supply chain, data supply chain, and user base. The aforementioned factors make such software applications potentially vulnerable to bad actors, as the widely adopted DevOps tools and practices were not designed for high-complexity and high-risk environments. In this study, I investigate the security challenges of the development and management of complex space applications, which differentiate the process from the commonly used practices. My findings are based on interviews with five domain experts from the industry and are further supported by a comprehensive review of relevant publications. To illustrate the dynamics of the problem, I present and discuss an actual software supply chain structure used by Thales Alenia Space, which is one of the largest suppliers of the European Space Agency. Subsequently, I discuss the four most critical security challenges identified by the interviewed experts: Verification of software artifacts, verification of the deployed application, single point of security failure, and data tampering by trusted stakeholders. Furthermore, I present best practices which could be used to overcome each of the given challenges, and whether the interviewed experts think their organization has access to the right tools to address them. Finally, I propose future research of new DevSecOps strategies, practices, and tools which would enable better methods of software integrity verification in the space and defense industries.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to explore the actual security challenges in the software development life cycle (SDLC) of complex space applications, especially how these challenges differ from the traditional SDLC process. Specifically, by interviewing five industry experts and combining with literature review, the paper identifies four of the most critical security challenges and discusses whether the current best practices and tools for dealing with these challenges are sufficient. #### Four of the most critical security challenges: 1. **Verification of Software Artifacts** - **Problem description**: In the space and defense industries, software applications are usually built using multiple programming languages and frameworks. Dynamic programming languages (such as JavaScript and Python) are particularly vulnerable to malicious code injection attacks. Due to the lack of effective tools to verify the integrity of third - party dependencies and build outputs, this makes the verification of software artifacts difficult. - **Risk level**: Highest risk (5, 5, 4), with a total score of 14. - **Expert opinion**: All three interviewed experts believe that their organizations do not have sufficient tools to deal with this challenge. 2. **Verification of The Deployed Application** - **Problem description**: Even if an application is successfully deployed to a remote server, its security may still be modified at startup. Existing health monitoring methods are difficult to detect such changes. Although code signing is a potential solution, the lack of public key infrastructure (PKI) in the European software supply chain makes this method not widely applicable. - **Risk level**: Second - highest risk (5, 4, 4), with a total score of 13. - **Expert opinion**: Two of the interviewed experts believe that their organizations do not have sufficient tools to deal with this challenge, while another expert holds a different opinion. 3. **Single Point of Security Failure** - **Problem description**: A vulnerability in a small software component may endanger the security of the entire large - scale software infrastructure. To solve this problem, it is recommended to adopt a microservices architecture instead of a monolithic architecture in the design stage. This can improve the flexibility of testing, maintenance, and expansion, while reducing the impact of damage to a single microservice on other microservices. - **Risk level**: Medium risk (4, 3, 2), with a total score of 9. - **Expert opinion**: All three interviewed experts believe that their organizations have sufficient tools to deal with this challenge, but one of the experts said that this is one of the biggest challenges faced by their organization. 4. **Data Tampering by Trusted Stakeholders** - **Problem description**: Companies in the space and defense industries are usually large - scale, with deep supply chains, and deal with expensive products and components. Manufacturing defects, component test failures, and technical documentation errors may lead to business losses of millions of euros. Therefore, employees have a strong motivation to cover up their responsibilities and shift the blame to other departments or upstream and downstream suppliers. Technically, the use of blockchain - based distributed database systems can increase transparency, trust, and traceability. - **Risk level**: Lower risk (5, 3), with a total score of 8. - **Expert opinion**: Both of the interviewed experts believe that their organizations have sufficient tools to deal with this challenge, but one of the experts mentioned that the organization is making slow progress in adopting these tools. ### Research objectives The main objectives of this research are to help the space and defense community: 1. Understand the major SDLC security challenges in their industry. 2. Raise the awareness of organizations about the importance of implementing a secure SDLC process. By openly discussing these real - world security challenges, the research hopes to promote academia, researchers, and professionals to jointly seek more effective DevSecOps strategies, practices, and tools to ensure software integrity verification in complex space applications. ### Conclusions and future work The paper summarizes four of the most critical security challenges and proposes future research directions, including the development of new DevSecOps strategies, practices, and tools.