首页> 外文会议>IEEE Military Communications Conference >Securing commercial WiFi-based UAVs from common security attacks
【24h】

Securing commercial WiFi-based UAVs from common security attacks

机译:保护基于WiFi的商用无人机免受常见的安全攻击

获取原文

摘要

We posit that commercial Wi-Fi-based unmanned aerial vehicles (UAV) are vulnerable to common and basic security attacks, capable by beginner to intermediate hackers. We do this by demonstrating that the standard ARDiscovery Connection process and the Wi-Fi access point used in the Parrot Bebop UAV are exploitable such that the UAV's ability to fly can be disrupted mid-flight by a remote attacker. We believe that these vulnerabilities are systemic in Wi-Fi-based Parrot UAVs. Our approach observed the normal operation (i.e., ARDiscovery Connection process over Wi-Fi) of the Parrot Bebop UAV. We then used a fuzzing technique to discover that the Parrot Bebop UAV is vulnerable to basic denial of service (DoS) and buffer-overflow attacks during its ARDiscovery Connection process. The exploitation of these vulnerabilities could result in catastrophic and immediate disabling of the UAV's rotors midflight. Also, we discovered that the Parrot Bebop UAV is vulnerable to a basic ARP (Address Resolution Protocol) Cache Poisoning attack, which can disconnect the primary mobile device user and in most cases cause the UAV to land or return home. Based on the literature and our own penetration testing, we assert that Wi-Fi-based commercial UAVs require a comprehensive security framework that utilizes a defense-in-depth approach. This approach would likely mitigate security risks associated with the three zero-day vulnerabilities described in this paper as well as other vulnerabilities reported in the literature. This framework will be effective for Parrot Wi-Fi-based commercial UAVs and likely others with similar platforms.
机译:我们认为,基于商用Wi-Fi的无人机(UAV)容易受到初学者到中级黑客攻击的常见和基本安全攻击。我们通过证明标准的ARDiscovery连接过程和Parrot Bebop无人机中使用的Wi-Fi接入点可以利用这一点,从而使远程攻击者在飞行途中可以破坏无人机的飞行能力。我们认为,这些漏洞在基于Wi-Fi的Parrot UAV中是系统性的。我们的方法观察到了鹦鹉Bebop无人机的正常操作(即通过Wi-Fi进行的ARDiscovery连接过程)。然后,我们使用一种模糊测试技术来发现Parrot Bebop UAV在其ARDiscovery Connection过程中容易受到基本的拒绝服务(DoS)和缓冲区溢出攻击。利用这些漏洞可能导致无人机的中途飞行灾难性且立即失效。此外,我们还发现Parrot Bebop无人机很容易受到基本的ARP(地址解析协议)缓存中毒攻击的攻击,这可能会断开主要移动设备用户的连接,并且在大多数情况下会导致无人机着陆或返回家中。根据文献和我们自己的渗透测试,我们认为基于Wi-Fi的商用无人机需要使用深度防御方法的综合安全框架。这种方法可能会减轻与本文所述的三个零日漏洞以及文献中报告的其他漏洞相关的安全风险。该框架将对基于Parrot Wi-Fi的商用无人机以及具有类似平台的其他无人机有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号