2015 IEEE 35th International Conference on Distributed Computing Systems 2015
DOI: 10.1109/icdcs.2015.71
|View full text |Cite
|
Sign up to set email alerts
|

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles

Abstract: As embedded systems have increased in performance and reliability, their applications have expanded into new domains such as automated drone-based delivery mechanisms. Security of these drones, also referred to as unmanned aerial vehicles (UAVs), is crucial due to their use in many different domains. In this paper, we present a stealthy attack strategy that allows the attacker to change sensor values and modify the UAV navigation path. As the attack is stealthy, the system will continue to execute normally and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(23 citation statements)
references
References 23 publications
0
23
0
Order By: Relevance
“…An adversary may also be able to change any data from the SRAM memory. For example, Habibi et al [15] proposed an attack that modifies the registers of an Unmaned Aerial Vehicle (UAV) gyroscope to control its flight.…”
Section: Attack Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…An adversary may also be able to change any data from the SRAM memory. For example, Habibi et al [15] proposed an attack that modifies the registers of an Unmaned Aerial Vehicle (UAV) gyroscope to control its flight.…”
Section: Attack Overviewmentioning
confidence: 99%
“…Memory corruption vulnerabilities have been widely explored as a strategy to hijack the execution control flow for a huge variety of systems, including embedded and mobile devices [6,12,15]. In the past, once the adversary gained control of the execution, the immediate next step was to directly jump into its own malicious payload, which was already injected in the exploit [8].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations