UAV Resilience Against Stealthy Attacks
- URL: http://arxiv.org/abs/2503.17298v2
- Date: Mon, 14 Apr 2025 14:48:23 GMT
- Title: UAV Resilience Against Stealthy Attacks
- Authors: Arthur Amorim, Max Taylor, Trevor Kann, Gary T. Leavens, William L. Harrison, Lance Joneckis,
- Abstract summary: We present an architecture running a UAV software stack with runtime monitoring and seL4-based software isolation.<n>Our architecture retrofits legacy UAVs and secures the popular MAVLink protocol, making wide adoption possible.
- Score: 0.11545092788508222
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Unmanned aerial vehicles (UAVs) depend on untrusted software components to automate dangerous or critical missions, making them a desirable target for attacks. Some work has been done to prevent an attacker who has either compromised a ground control station or parts of a UAV's software from sabotaging the vehicle, but not both. We present an architecture running a UAV software stack with runtime monitoring and seL4-based software isolation that prevents attackers from both exploiting software bugs and stealthy attacks. Our architecture retrofits legacy UAVs and secures the popular MAVLink protocol, making wide adoption possible.
Related papers
- Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey [1.6874375111244329]
Unmanned Aerial Vehicles (UAVs) play a pivotal role in modern autonomous air mobility.
The success of UAV missions depends on effectively mitigating various aspects of electronic warfare.
This paper provides a comprehensive review of UAV cyberattacks, countermeasures, and defensive strategies.
arXiv Detail & Related papers (2025-04-10T00:56:52Z) - Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models [53.701148276912406]
Vision-Large-Language-models (VLMs) have great application prospects in autonomous driving.
BadVLMDriver is the first backdoor attack against VLMs for autonomous driving that can be launched in practice using physical objects.
BadVLMDriver achieves a 92% attack success rate in inducing a sudden acceleration when coming across a pedestrian holding a red balloon.
arXiv Detail & Related papers (2024-04-19T14:40:38Z) - Tiny Multi-Agent DRL for Twins Migration in UAV Metaverses: A Multi-Leader Multi-Follower Stackelberg Game Approach [57.15309977293297]
The synergy between Unmanned Aerial Vehicles (UAVs) and metaverses is giving rise to an emerging paradigm named UAV metaverses.
We propose a tiny machine learning-based Stackelberg game framework based on pruning techniques for efficient UT migration in UAV metaverses.
arXiv Detail & Related papers (2024-01-18T02:14:13Z) - UAV Swarm-enabled Collaborative Secure Relay Communications with
Time-domain Colluding Eavesdropper [115.56455278813756]
Unmanned aerial vehicles (UAV) as aerial relays are practically appealing for assisting Internet Things (IoT) network.
In this work, we aim to utilize the UAV to assist secure communication between the UAV base station and terminal terminal devices.
arXiv Detail & Related papers (2023-10-03T11:47:01Z) - Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System [56.51247807483176]
Unmanned Aerial Vehicles (UAVs) have been widely used in many areas, including transportation, surveillance, and military.
Previous works have simplified such an anti-UAV task as a tracking problem, where prior information of UAVs is always provided.
In this paper, we first formulate a new and practical anti-UAV problem featuring the UAVs perception in complex scenes without prior UAVs information.
arXiv Detail & Related papers (2023-06-27T19:30:23Z) - Attention-based Reinforcement Learning for Real-Time UAV Semantic
Communication [53.46235596543596]
We study the problem of air-to-ground ultra-reliable and low-latency communication (URLLC) for a moving ground user.
We propose a novel multi-agent deep reinforcement learning framework, coined a graph attention exchange network (GAXNet)
GAXNet achieves 6.5x lower latency with the target 0.0000001 error rate, compared to a state-of-the-art baseline framework.
arXiv Detail & Related papers (2021-05-22T12:43:25Z) - Anti-UAV: A Large Multi-Modal Benchmark for UAV Tracking [59.06167734555191]
Unmanned Aerial Vehicle (UAV) offers lots of applications in both commerce and recreation.
We consider the task of tracking UAVs, providing rich information such as location and trajectory.
We propose a dataset, Anti-UAV, with more than 300 video pairs containing over 580k manually annotated bounding boxes.
arXiv Detail & Related papers (2021-01-21T07:00:15Z) - Secure communication between UAVs using a method based on smart agents
in unmanned aerial vehicles [1.2691047660244335]
Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure.
Such communication poses security challenges due to its dynamic topology.
The proposed method uses two phases to counter malicious UAV attacks.
arXiv Detail & Related papers (2020-11-03T10:33:39Z) - Collaborative Tracking and Capture of Aerial Object using UAVs [0.16863755729554883]
This problem is motivated from the challenge 1 of Mohammed Bin Zayed International Robotic Challenge 2020.
The UAVs utilise visual feedback to autonomously detect target, approach it and capture without disturbing the vehicle which carries the target.
arXiv Detail & Related papers (2020-10-04T14:23:03Z) - Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests [0.0]
Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable of flight.
Cyber attacks on UAVs can bring a plethora of issues to physical and virtual systems.
To mitigate such attacks, it is necessary to identify and patch vulnerabilities.
arXiv Detail & Related papers (2020-08-09T00:40:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.