Controlling UAVs with Sensor Input Spoofing Attacks is a work by Drew Davidson (Univ. of Wisconsin), Hao Wu (Univ. of Wisconsin), Robert Jellinek (Univ. of Wisconsin), Thomas Ristenpart (Cornell Tech), and Vikas Singh (Univ. of Wisconsin)
The paper’s main idea is that the sensors employed by autonomous vehicles to navigate could be exploited as a vector for adversarial control. By having a clear understanding of how the sensor algorithms work, a malicious actor could manipulate the victim’s surroundings to establish an implicit control channel. We have developed an attack strategy based on this concept, which we refer to as a “sensor input spoofing attack.”
Publication Date- Unknown
Controlling UAVs with Sensor Input Spoofing Attacks contains the following major sections:
- Optical Flow for UAVs
- Real-World Attacks
- Sensor Input Spoofing Simulations
- Future Work
- Related Work
There are no documented limitations of the distribution of this paper.
C-UAS Hub does not own this content and provides a link for users at the bottom of the page to access it in its original location. This allows the author(s) to track important article metrics related to their work. All credit goes to its rightful owner.
Authors- Drew Davidson, Hao Wu, Robert Jellinek, Thomas Ristenpart, and Vikas Singh
For additional multimedia resources, please visit the Multimedia Library.