@inproceedings{cdeaadf1cf1f44d9a932e6156f198fe9,
title = "UAV Resilience Against Stealthy Attacks",
abstract = "Unmanned aerial vehicles (UAVs) depend on untrusted software components to automate dangerous or critical missions, making them a desirable target for attacks. Some work has been done to prevent an attacker who has either compromised a ground control station or parts of a UAV's software from sabotaging the vehicle, but not both. We present an architecture running a UAV software stack with runtime monitoring and seL4-based software isolation that prevents attackers from both exploiting software bugs and stealthy attacks. Our architecture retrofits legacy UAVs and secures the popular MAVLink protocol, making wide adoption possible.",
keywords = "Integrated formal methods, MAVLink, Run-time monitors, Sel4",
author = "Arthur Amorim and Max Taylor and Trevor Kann and Leavens, \{Gary T.\} and Harrison, \{William L.\} and Lance Joneckis",
note = "Publisher Copyright: {\textcopyright} 2025 IEEE.; 2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025 ; Conference date: 14-05-2025 Through 17-05-2025",
year = "2025",
doi = "10.1109/ICUAS65942.2025.11007915",
language = "English",
series = "2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "994--1001",
booktitle = "2025 International Conference on Unmanned Aircraft Systems, ICUAS 2025",
address = "United States",
}