Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests
- URL: http://arxiv.org/abs/2008.03621v1
- Date: Sun, 9 Aug 2020 00:40:54 GMT
- Title: Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests
- Authors: David Rudo and Dr. Kai Zeng
- Abstract summary: Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable of flight.
Cyber attacks on UAVs can bring a plethora of issues to physical and virtual systems.
To mitigate such attacks, it is necessary to identify and patch vulnerabilities.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable of
flight and are present in a variety of environments from military operations to
domestic enjoyment. These vehicles are great assets, but just as their pilot
can control them remotely, cyberattacks can be executed in a similar manner.
Cyber attacks on UAVs can bring a plethora of issues to physical and virtual
systems. Such malfunctions are capable of giving an attacker the ability to
steal data, incapacitate the UAV, or hijack the UAV. To mitigate such attacks,
it is necessary to identify and patch vulnerabilities that may be maliciously
exploited. In this paper, a new UAV vulnerability is explored with related UAV
security practices identified for possible exploitation using large streams of
data sent at specific ports. The more in-depth model involves strings of data
involving FTP-specific keywords sent to the UAV's FTP port in the form of a
fuzzing test and launching thousands of packets at other ports on the UAV as
well. During these tests, virtual and physical systems are monitored
extensively to identify specific patterns and vulnerabilities. This model is
applied to a Parrot Bebop 2, which accurately portrays a UAV that had their
network compromised by an attacker and portrays many lower-end UAV models for
domestic use. During testings, the Parrot Bebop 2 is monitored for degradation
in GPS performance, video speed, the UAV's reactivity to the pilot, motor
function, and the accuracy of the UAV's sensor data. All these points of
monitoring give a comprehensive view of the UAV's reaction to each individual
test. In this paper, countermeasures to combat the exploitation of this
vulnerability will be discussed as well as possible attacks that can branch
from the fuzzing tests.
Related papers
- Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey [1.6874375111244329]
Unmanned Aerial Vehicles (UAVs) play a pivotal role in modern autonomous air mobility.
The success of UAV missions depends on effectively mitigating various aspects of electronic warfare.
This paper provides a comprehensive review of UAV cyberattacks, countermeasures, and defensive strategies.
arXiv Detail & Related papers (2025-04-10T00:56:52Z) - UAV Resilience Against Stealthy Attacks [0.11545092788508222]
We present an architecture running a UAV software stack with runtime monitoring and seL4-based software isolation.
Our architecture retrofits legacy UAVs and secures the popular MAVLink protocol, making wide adoption possible.
arXiv Detail & Related papers (2025-03-21T16:48:11Z) - Sensor Deprivation Attacks for Stealthy UAV Manipulation [51.9034385791934]
Unmanned Aerial Vehicles autonomously perform tasks with the use of state-of-the-art control algorithms.
In this work, we propose a multi-part.
Sensor Deprivation Attacks (SDAs), aiming to stealthily impact.
process control via sensor reconfiguration.
arXiv Detail & Related papers (2024-10-14T23:03:58Z) - UAVDB: Trajectory-Guided Adaptable Bounding Boxes for UAV Detection [0.03464344220266879]
Patch Intensity Convergence (PIC) technique generates high-fidelity bounding boxes for UAV detection without manual labeling.
This technique forms the foundation of UAVDB, a dedicated database designed specifically for UAV detection.
We benchmark UAVDB using state-of-the-art (SOTA) YOLO series detectors, providing a comprehensive performance analysis.
arXiv Detail & Related papers (2024-09-09T13:27:53Z) - Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System [56.51247807483176]
Unmanned Aerial Vehicles (UAVs) have been widely used in many areas, including transportation, surveillance, and military.
Previous works have simplified such an anti-UAV task as a tracking problem, where prior information of UAVs is always provided.
In this paper, we first formulate a new and practical anti-UAV problem featuring the UAVs perception in complex scenes without prior UAVs information.
arXiv Detail & Related papers (2023-06-27T19:30:23Z) - Learning to Compress Unmanned Aerial Vehicle (UAV) Captured Video:
Benchmark and Analysis [54.07535860237662]
We propose a novel task for learned UAV video coding and construct a comprehensive and systematic benchmark for such a task.
It is expected that the benchmark will accelerate the research and development in video coding on drone platforms.
arXiv Detail & Related papers (2023-01-15T15:18:02Z) - A Multi-UAV System for Exploration and Target Finding in Cluttered and
GPS-Denied Environments [68.31522961125589]
We propose a framework for a team of UAVs to cooperatively explore and find a target in complex GPS-denied environments with obstacles.
The team of UAVs autonomously navigates, explores, detects, and finds the target in a cluttered environment with a known map.
Results indicate that the proposed multi-UAV system has improvements in terms of time-cost, the proportion of search area surveyed, as well as successful rates for search and rescue missions.
arXiv Detail & Related papers (2021-07-19T12:54:04Z) - UAV-ReID: A Benchmark on Unmanned Aerial Vehicle Re-identification [21.48667873335246]
Recent development in deep learning allows vision-based counter-UAV systems to detect and track UAVs with a single camera.
The coverage of a single camera is limited, necessitating the need for multicamera configurations to match UAVs across cameras.
We propose the first new UAV re-identification data set, UAV-reID, that facilitates the development of machine learning solutions in this emerging area.
arXiv Detail & Related papers (2021-04-13T14:13:09Z) - Anti-UAV: A Large Multi-Modal Benchmark for UAV Tracking [59.06167734555191]
Unmanned Aerial Vehicle (UAV) offers lots of applications in both commerce and recreation.
We consider the task of tracking UAVs, providing rich information such as location and trajectory.
We propose a dataset, Anti-UAV, with more than 300 video pairs containing over 580k manually annotated bounding boxes.
arXiv Detail & Related papers (2021-01-21T07:00:15Z) - Secure communication between UAVs using a method based on smart agents
in unmanned aerial vehicles [1.2691047660244335]
Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure.
Such communication poses security challenges due to its dynamic topology.
The proposed method uses two phases to counter malicious UAV attacks.
arXiv Detail & Related papers (2020-11-03T10:33:39Z) - Perceiving Traffic from Aerial Images [86.994032967469]
We propose an object detection method called Butterfly Detector that is tailored to detect objects in aerial images.
We evaluate our Butterfly Detector on two publicly available UAV datasets (UAVDT and VisDrone 2019) and show that it outperforms previous state-of-the-art methods while remaining real-time.
arXiv Detail & Related papers (2020-09-16T11:37:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.