{"id":49303,"date":"2022-11-15T16:32:09","date_gmt":"2022-11-15T16:32:09","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34041\/Researchers-Break-Security-Guarantees-Of-TTE-Networking-Use-In-Spacecraft.html"},"modified":"2022-11-15T16:32:09","modified_gmt":"2022-11-15T16:32:09","slug":"researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/","title":{"rendered":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/nasa-orion-simulator-800x533.jpg\" alt=\"People look inside an Orion spacecraft simulator, which is used to train for docking to the Gateway space station, at the Johnson Space Center's System Engineering Simulator facility in Houston.\"><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/nasa-orion-simulator.jpg\" class=\"enlarge-link\" data-height=\"5504\" data-width=\"8256\">Enlarge<\/a> <span class=\"sep\">\/<\/span> People look inside an Orion spacecraft simulator, which is used to train for docking to the Gateway space station, at the Johnson Space Center&#8217;s System Engineering Simulator facility in Houston.<\/div>\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"0 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/11\/researchers-break-security-guarantees-of-tte-networking-used-in-spacecraft\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">8<\/span> <span class=\"visually-hidden\"> with 0 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 13:single\/related:572dd3ad62b25a8643cf9f79f120dfe1 --><!-- empty --><\/p>\n<p>Wednesday&#8217;s scheduled launch by NASA of the Artemis I mission will be the first integrated test of the agency\u2019s SLS rocket and Orion spacecraft, which have been in development for 16 years and are expected to usher in a new era of space exploration. The uncrewed mission will also be only the second time a network standard known as time-triggered Ethernet has been taken into space, with the first being Orion&#8217;s <a href=\"https:\/\/www.computerworld.com\/article\/2855604\/the-orion-spacecraft-is-no-smarter-than-your-phone.html\">orbital test flight in 2014<\/a>.<\/p>\n<p>Time-triggered Ethernet (TTE) is an example of a mixed-criticality network, which is capable of routing traffic with differing levels of timing and different fault tolerance requirements over the same set of hardware. Until now, spacecraft generally relied on one network to transmit safety-critical or mission-critical messages and one or more completely segregated ones for carrying video conferencing and other types of less-critical traffic.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/ttethernet02.jpg\" class=\"enlarge\" data-height=\"842\" data-width=\"1830\" alt=\"Illustration of how time-triggered Ethernet works.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Illustration of how time-triggered Ethernet works.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/ttethernet02-640x294.jpg\" width=\"640\" height=\"294\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/ttethernet02-1280x589.jpg 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/ttethernet02.jpg\" class=\"enlarge-link\" data-height=\"842\" data-width=\"1830\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Illustration of how time-triggered Ethernet works.<\/div>\n<\/figcaption><\/figure>\n<h2>Engineers built a better mousetrap. The mice defeat it anyway<\/h2>\n<p>Orion is the first spacecraft to rely on a TTE network to route mixed-criticality traffic, whether, <a href=\"https:\/\/www.nasa.gov\/sites\/default\/files\/atoms\/files\/orion_reference_guide_090622.pdf\">NASA says<\/a>, it&#8217;s for vital systems like navigation and life support, file transfers that are critical for delivery but not timing, or non-critical tasks such as crew videoconferencing. TTE\u2014which will also be used in NASA\u2019s Lunar Gateway space station and the ESA\u2019s Ariane 6 launcher\u2014is crucial for reducing the size, weight, cost, and power requirements of modern spacecraft.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-avionics-and-communication-flow.jpg\" class=\"enlarge\" data-height=\"869\" data-width=\"1346\" alt=\"Example of TTE data flow in a spacecraft.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Example of TTE data flow in a spacecraft.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-avionics-and-communication-flow-640x413.jpg\" width=\"640\" height=\"413\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-avionics-and-communication-flow-1280x826.jpg 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-avionics-and-communication-flow.jpg\" class=\"enlarge-link\" data-height=\"869\" data-width=\"1346\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Example of TTE data flow in a spacecraft.<\/div>\n<\/figcaption><\/figure>\n<p>Safety-critical systems, like those for steering and engine control, often work only when network messages are sent and received at intervals as small as 40 to 50 milliseconds. Delayed or dropped messages can be catastrophic. The other end of the criticality spectrum contains messages sent by scientific instruments, which often come in the form of commercial off-the-shelf devices and are provided by universities or outside researchers with minimal safety review from NASA. While it\u2019s 100 percent compatible with the Ethernet standard, TTE is also able to deliver messages that engineers normally reserve for special-purpose networks.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>To prevent less-important messages from interfering with critical ones, TTE provides two key benefits not available in regular Ethernet. They are:<\/p>\n<ul>\n<li>A time-triggered paradigm where all devices are tightly synchronized and send messages at a predetermined schedule. This can reduce latency to hundreds of microseconds and jitter to near zero.<\/li>\n<li>Fault tolerance\u2014TTE replicates the whole network into multiple planes and forwards messages across all planes at once. The TTE network onboard Gateway <a href=\"https:\/\/www.youtube.com\/watch?v=TT5HM1Bsizc\">has three planes<\/a>.<\/li>\n<\/ul>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-network-overview.jpg\" class=\"enlarge\" data-height=\"1047\" data-width=\"1436\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-network-overview-640x467.jpg\" width=\"640\" height=\"467\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/gateway-network-overview-1280x933.jpg 2x\"><\/a><figcaption class=\"caption\"><\/figcaption><\/figure>\n<p>On Tuesday, researchers <a href=\"https:\/\/www.google.com\/url?q=https:\/\/web.eecs.umich.edu\/~barisk\/public\/pcspoof.pdf&amp;sa=D&amp;source=docs&amp;ust=1668491599680689&amp;usg=AOvVaw01x1laCgH6h4JHf_0D-QpM\">published findings<\/a> that, for the first time, break TTE\u2019s isolation guarantees. The result is PCspooF, an attack that allows a single non-critical device connected to a single plane to disrupt synchronization and communication between TTE devices on all planes. The attack works by exploiting a vulnerability in the TTE protocol. The work was completed by researchers at the University of Michigan, the University of Pennsylvania, and NASA&#8217;s Johnson Space Center.<\/p>\n<p>\u201cOur evaluation shows that successful attacks are possible in seconds and that each successful attack can cause TTE devices to lose synchronization for up to a second and drop tens of TT messages\u2014both of which can result in the failure of critical systems like aircraft or automobiles,\u201d the researchers wrote. \u201cWe also show that, in a simulated spaceflight mission, PCspooF causes uncontrolled maneuvers that threaten safety and mission success.\u201d<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/anvil2-scaled.jpg\" class=\"enlarge\" data-height=\"1920\" data-width=\"2560\" alt=\"Artemis Network Validation and Integration Laboratory (ANVIL) at NASA Johnson Space Center, where much of the research into PCspooF was conducted.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Artemis Network Validation and Integration Laboratory (ANVIL) at NASA Johnson Space Center, where much of the research into PCspooF was conducted.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/anvil2-640x480.jpg\" width=\"640\" height=\"480\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/anvil2-1280x960.jpg 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/anvil2-scaled.jpg\" class=\"enlarge-link\" data-height=\"1920\" data-width=\"2560\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Artemis Network Validation and Integration Laboratory (ANVIL) at NASA Johnson Space Center, where much of the research into PCspooF was conducted.<\/div>\n<\/figcaption><\/figure>\n<p>PCspooF can be built onto as little as a 2.5 cm\u00d72.5 cm area of a single-layer printed circuit board and requires minimal power and network bandwidth, which allows a malicious device to blend in with all the other best-effort devices connected to the network. The researchers privately reported their findings to NASA and other big stakeholders in TTE. In an email, a NASA representative wrote, \u201cNASA teams are aware of the findings from research on TTE and have taken proactive measures to ensure potential risks to spacecraft are appropriately mitigated.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34041\/Researchers-Break-Security-Guarantees-Of-TTE-Networking-Use-In-Spacecraft.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49304,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10281],"class_list":["post-49303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerspaceflawscience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T16:32:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/nasa-orion-simulator-800x533.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft\",\"datePublished\":\"2022-11-15T16:32:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg\",\"keywords\":[\"headline,hacker,space,flaw,science\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/\",\"name\":\"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg\",\"datePublished\":\"2022-11-15T16:32:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,space,flaw,science\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerspaceflawscience\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-15T16:32:09+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/11\/nasa-orion-simulator-800x533.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft","datePublished":"2022-11-15T16:32:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg","keywords":["headline,hacker,space,flaw,science"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/","url":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/","name":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg","datePublished":"2022-11-15T16:32:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researchers-break-security-guarantees-of-tte-networking-use-in-spacecraft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,space,flaw,science","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerspaceflawscience\/"},{"@type":"ListItem","position":3,"name":"Researchers Break Security Guarantees Of TTE Networking Use In Spacecraft"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49303"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49303\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49304"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}