All Issue

2025 Vol.2, Issue 2 Preview Page

Research Article

31 December 2025. pp. 45-61
Abstract
References
1

News1, ‘United We Stand’…What Makes Small-Scale Cluster Satellites Different from General Satellites? [Online]. Available at: https://news1.kr/articles/?5394922#_enliple[Accessed 21/05/2024].

2

NASA Goddard Space Flight Center, Near Earth Network (NEN) Users’ Guide, NASA, 2019.

3

ESA ESTRACK, ESTRACK Overview [Online]. Available at: https://www.esa.int/About_Us/ESOC/ESTRACK [Accessed 19/05/2024].

4

JAXA Space Tracking and Communications Center [Online]. Available at: https://track.sfo.jaxa.jp/en/index.html [Accessed 28/07/2024].

5

KSAT (Kongsberg Satellite Services) [Online]. Available at: https://www.ksat.no/ [Accessed 04/09/2024].

6

SSC (Swedish Space Corporation) [Online]. Available at: https://sscspace.com/ [Accessed 04/09/2024].

7

Leaf Space [Online]. Available at: https://leaf.space/ [Accessed 04/09/2024].

8

RBC Signal [Online]. Available at: https://rbcsignals.com/ [Accessed 04/09/2024].

9

ATLAS Space Operation [Online]. Available at: https://atlasspace.com/ [Accessed 04/09/2024].

10

Infostellar [Online]. Available at: https://www.infostellar.net/ [Accessed 04/09/2024].

11

CONTEC [Online]. Available at: https://kr.contec.kr/ [Accessed 04/09/2024].

12

METI (Ministry of Economy, Trade and Industry), Cybersecurity Guidelines for Commercial Space Systems ver 2.0, METI, 2024.

13

T. Son, T.S. Son, H.M. Choi, S.H. Chae, J.T. Seo, and S.H. Yoo, Analysis of Security Threats and Security Network Structure in Satellite Communication Networks. Journal of the Korea Institute of Information Security and Cryptology. 11(4) (2001), pp. 15-31.

14

S. Choi, N.-S. Lee, and B.-K. Kim, Telemetry System Encryption Techniques Using the ARIA Cryptographic Algorithm. Journal of the Korean Institute of Navigation and Port Research. 24(2) (2020), pp. 134-141.

15

M. Lee, Trends in Space Security Management Systems and Technologies Abroad. Aerospace Industry Technology Trends. 21(2) (2023), pp. 141-149.

16

H. Nam, N. Park, and K. Lee, Design of Buffer Overflow Detection System Using Virtualization Technology, Proceedings of the Korean Institute of Information Processing Society Fall Conference, November 28-29 (2008).

17

Y. Kwon and N. Park, Buffer Overflow Defense System in Virtualized Environments, Proceedings of the Korean Institute of Information Processing Society Spring Conference, April 30 (2011).

18

J. Kim, Study on ASLR Bypass Detection Techniques for Information System Security Audits. Master’s Thesis, Kyung Hee University, Yongin, Korea, 2014.

19

E. Ko, Introduction to Information and Communication in the 4th Industrial Revolution. 2020, Seoul, Korea: Hanbit Academy.

20

K.-U. Schrogl, M. Adriaensen, and C. Giannopapa, Handbook of Space Security (2nd Edition). 2020, Springer.

21

Ministry of Science and ICT, Space Development Project Security Management Regulations [Online]. Available at: https://www.law.go.kr/LSW/admRulLsInfoP.do?admRulSeq=2100000236568 [Accessed 24/05/2024].

Information
  • Publisher :Korean Academy of Space Security
  • Publisher(Ko) :한국우주안보학회
  • Journal Title :JOURNAL OF SPACE SECURITY
  • Journal Title(Ko) :한국우주안보학회지
  • Volume : 2
  • No :2
  • Pages :45-61
  • Received Date : 2025-03-04
  • Revised Date : 2025-07-02
  • Accepted Date : 2025-11-20