| ID | Name |
|---|---|
| T2053.001 | Receiver flooding |
| T2053.002 | Avionics Bus Flooding |
| T2053.003 | OBC overloading |
| T2053.004 | Drain satellite's power |
| T2053.005 | Waste of propellant |
| T2053.006 | RTOS Scheduler Compromise |
| T2053.007 | Hypervisor Scheduling Compromise |
The attacker can target satellites with energy or resource constraints to lead them prioritizing power saving efforts and disabling security controls. The satellite becomes then more vulnerable to other attacks such as gaining unauthorized access or eavesdropping on cleartext communications. This goal can be reached with a regenerative payload "flooding", sending to the satellite more packets than expected to rapidly consume its energy. The exploitation of a payload application can achieve a similar result.[1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.