UAV Resilience Against Stealthy Attacks

Arthur Amorim, Max Taylor, Trevor Kann, Gary T. Leavens, William L. Harrison, Lance Joneckis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Unmanned aerial vehicles (UAVs) depend on untrusted software components to automate dangerous or critical missions, making them a desirable target for attacks. Some work has been done to prevent an attacker who has either compromised a ground control station or parts of a UAV's software from sabotaging the vehicle, but not both. We present an architecture running a UAV software stack with runtime monitoring and seL4-based software isolation that prevents attackers from both exploiting software bugs and stealthy attacks. Our architecture retrofits legacy UAVs and secures the popular MAVLink protocol, making wide adoption possible.

Original languageEnglish
Title of host publication2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages994-1001
Number of pages8
ISBN (Electronic)9798331513283
DOIs
StatePublished - 2025
Externally publishedYes
Event2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025 - Charlotte, United States
Duration: 14 May 202517 May 2025

Publication series

Name2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025

Conference

Conference2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025
Country/TerritoryUnited States
CityCharlotte
Period14/05/2517/05/25

Keywords

  • Integrated formal methods
  • MAVLink
  • Run-time monitors
  • Sel4

Fingerprint

Dive into the research topics of 'UAV Resilience Against Stealthy Attacks'. Together they form a unique fingerprint.

Cite this