首页> 外文会议>IEEE Symposium on Security and Privacy >Drones' Cryptanalysis - Smashing Cryptography with a Flicker
【24h】

Drones' Cryptanalysis - Smashing Cryptography with a Flicker

机译:无人机的密码分析-闪烁闪烁的密码学

获取原文

摘要

In an "open skies" era in which drones fly among us, a new question arises: how can we tell whether a passing drone is being used by its operator for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)? Over the years, many methods have been suggested to detect the presence of a drone in a specific location, however since populated areas are no longer off limits for drone flights, the previously suggested methods for detecting a privacy invasion attack are irrelevant. In this paper, we present a new method that can detect whether a specific POI (point of interest) is being video streamed by a drone. We show that applying a periodic physical stimulus on a target/victim being video streamed by a drone causes a watermark to be added to the encrypted video traffic that is sent from the drone to its operator and how this watermark can be detected using interception. Based on this method, we present an algorithm for detecting a privacy invasion attack. We analyze the performance of our algorithm using four commercial drones (DJI Mavic Air, Parrot Bebop 2, DJI Spark, and DJI Mavic Pro). We show how our method can be used to (1) determine whether a detected FPV (first-person view) channel is being used to video stream a POI by a drone, and (2) locate a spying drone in space; we also demonstrate how the physical stimulus can be applied covertly. In addition, we present a classification algorithm that differentiates FPV transmissions from other suspicious radio transmissions. We implement this algorithm in a new invasion attack detection system which we evaluate in two use cases (when the victim is inside his/her house and when the victim is being tracked by a drone while driving his/her car); our evaluation shows that a privacy invasion attack can be detected by our system in about 2-3 seconds.
机译:在无人机在我们中间飞舞的“开放天空”时代,出现了一个新问题:我们如何判断其操作员是出于正当目的(例如,运送披萨)还是出于非法目的(例如,偷看一个人在他/她自己的房子里洗澡)?多年来,已经提出了许多方法来检测特定位置是否存在无人机,但是由于人口稠密的地区不再不受无人机飞行的限制,因此先前提出的用于检测隐私入侵攻击的方法已无关紧要。在本文中,我们提出了一种新方法,该方法可以检测无人机是否正在流传输特定的POI(兴趣点)。我们显示,在由无人机流式传输的视频的目标/受害者身上施加周期性的物理刺激会导致水印被添加到从无人机发送到其操作员的加密视频流量中,以及如何使用侦听来检测该水印。基于此方法,我们提出了一种检测隐私入侵攻击的算法。我们使用四种商用无人机(DJI Mavic Air,Parrot Bebop 2,DJI Spark和DJI Mavic Pro)分析算法的性能。我们将展示如何使用我们的方法来(1)确定是否使用检测到的FPV(第一人称视角)频道通过无人机对POI进行视频流传输,以及(2)在太空中找到间谍无人机;我们还演示了如何暗中应用物理刺激。此外,我们提出了一种分类算法,可将FPV传输与其他可疑无线电传输区分开来。我们在新的入侵攻击检测系统中实现了该算法,并在两个用例中进行评估(当受害者在他/她的房屋内,以及在驾驶他/她的汽车时无人驾驶飞机追踪受害者)我们的评估表明,我们的系统可以在大约2-3秒内检测到隐私入侵攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号