Andrea Angelo Raineri
Reverse Engineering of the Starlink User Terminal.
Rel. Riccardo Sisto. Politecnico di Torino, Corso di laurea magistrale in Cybersecurity, 2025
Abstract
Starlink represents the world's leading satellite-based Internet Service Provider, serving more than 7 million users globally through its Low Earth Orbit constellation. Beyond its commercial success in providing connectivity to remote and underserved regions, Starlink has increasingly become critical infrastructure for military operations and disaster recovery scenarios in conflict zones with compromised terrestrial infrastructure like Ukraine. This widespread adoption and strategic importance underscore the necessity of comprehensive security analysis to identify potential vulnerabilities that could compromise its users, from individual consumers to military deployments. Prior research provided initial understanding of the Starlink User Terminal (UT), including hardware teardowns identifying components and debug interfaces, invasive firmware extraction via eMMC chip-off techniques and firmware structure analysis.
A successful power glitch fault injection attack also allowed to bypass secure boot protections and gain root access to the UT
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Informazioni aggiuntive
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
