VirtualDrone
- 18 April 2017
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 8th International Conference on Cyber-Physical Systems
- p. 143-154
- https://doi.org/10.1145/3055004.3055010
Abstract
As modern unmanned aerial systems (UAS) continue to expand the frontiers of automation, new challenges to security and thus its safety are emerging. It is now difficult to completely secure modern UAS platforms due to their openness and increasing complexity. We present the VirtualDrone Framework, a software architecture that enables an attack-resilient control of modern UAS. It allows the system to operate with potentially untrustworthy software environment by virtualizing the sensors, actuators, and communication channels. The framework provides mechanisms to monitor physical and logical system behaviors and to detect security and safety violations. Upon detection of such an event, the framework switches to a trusted control mode in order to override malicious system state and to prevent potential safety violations. We built a prototype quadcoper running an embedded multicore processor that features a hardware-assisted virtualization technology. We present extensive experimental study and implementation details, and demonstrate how the framework can ensure the robustness of the UAS in the presence of security breaches.Keywords
Funding Information
- U.S. Navy (N00014-14-1-0717)
- National Science Foundation (CNS 13-02563)
This publication has 18 references indexed in Scilit:
- Memory heat mapPublished by Association for Computing Machinery (ACM) ,2015
- Secure Estimation in the Presence of Integrity AttacksIEEE Transactions on Automatic Control, 2014
- On the feasibility of software attacks on commodity virtual machine monitors via direct device assignmentPublished by Association for Computing Machinery (ACM) ,2014
- Unmanned Aircraft Capture and Control Via GPS SpoofingJournal of Field Robotics, 2014
- L1SimplexPublished by Association for Computing Machinery (ACM) ,2013
- Process out-graftingPublished by Association for Computing Machinery (ACM) ,2011
- On the requirements for successful GPS spoofing attacksPublished by Association for Computing Machinery (ACM) ,2011
- PanoramaPublished by Association for Computing Machinery (ACM) ,2007
- Automated detection of persistent kernel control-flow attacksPublished by Association for Computing Machinery (ACM) ,2007
- Using simplicity to control complexityIEEE Software, 2001