Chip Security Testing 
Binary Security Analysis 
Resources 
Blog
Contact us
Back to all articles
Corporate News

New ESA Hardware Security Laboratory built by eShard

3 min read
Edit by Fernanda Delestre • Oct 1, 2025
Share

Protecting the ground segment of space networks

Orbiting assets may cruise hundreds of kilometres above Earth, but the ground-segment equipment that keeps them online sits in car parks, roof-tops and control rooms that can be reached. Private companies now operate more than 60% of the active satellites in orbit, multiplying the user terminals, gateway racks and ground-station antenna that must be trusted day-to-day.

Recent events show why that trust matters. On 24 February 2022, a wiper attack against Viasat’s KA-SAT network knocked tens of thousands of customer modems offline and cut remote-monitoring links to 5,800 Enercon wind turbines in Germany, demonstrating how a single strike on ground hardware can ripple across critical services.

Security research is pushing the same lesson from another angle. At Black Hat 2022, engineer Lennert Wouters used a home-built fault-injection “modchip” that cost about €230 (~$250) to gain persistent root access to a Starlink user terminal—proof that physical intrusion is a valid threat, even with low-budget equipment.

Taken together, these trends make it clear: defending the terminals is defending the constellation. The European Space Agency (ESA) therefore required a laboratory where engineers could replicate real-world side-channel attacks, electromagnetic attacks and fault injection glitches to advocate good security practices and appropriate levels of counter-measures.

 

Building capacity for hands-on hardware defence

In 2024, the European Space Agency opened a competitive tender for designing and building a Hardware Security Laboratory able to replicate state-of-the-art side-channel, electromagnetic (EMFI) and glitch attacks.

After a competitive evaluation, eShard was awarded and provided as first step, a full survey of current attack techniques against modern chips. The study set the technical requirements and a clear verification plan for ESA’s new laboratory.

With the technical baseline agreed, the project shifted from analysis to execution. eShard translated the requirements into a concrete bill of equipment, verified each component at its own facility, and then transferred the complete, pre-configured equipment to ESA’s ESTEC centre for installation and site-acceptance testing.

 

Inside ESA’s new Hardware Security Laboratory

eShard has supplied a complete test environment that covers Side-Channel Analysis, Electromagnetic Fault Injection (EMFI) and precision voltage and clock glitching — the three physical-attack techniques most commonly used.

All benches are driven by esDynamic, installed on a dedicated server within ESA’s secure network. From any authorised workstation, engineers can control oscilloscopes and injectors in real time, watch traces as they stream in and tweak attack parameters together, without any data ever leaving the agency.

esDynamic supports true multi-user control inside separate project spaces: several analysts can work on the same data capture, annotate results together, and still keep benches, scripts and data visible only to their mission team. Every run is versioned automatically, so campaigns can be replayed or audited later while preserving a clean chain of custody.

To accelerate productivity, eShard delivered a library of pre-built attack scenarios and use cases, executable notebooks and reference datasets, plus hands-on training sessions with subject-matter experts.

 

What’s next

ESA has confirmed its satisfaction with the laboratory’s roll-out and next steps to deepen its collaboration with eShard are already under discussion.

Share

Categories

All articles
(103)
Binary Analysis
(57)
Chip Security
(40)
Corporate News
(16)
Expert Review
(5)
Time Travel Analysis
(13)

you might also be interested in

Binary Analysis

Analyzing and countering Windows anti-VM techniques

15 min read
Edit by Elouan Charbonnier • Aug 29, 2025
CopyRights eShard 2025.
All rights reserved
Privacy policy | Legal Notice
CHIP SECURITY
esDynamicExpertise ModulesInfraestructureLab Equipments