An Experimental Study of Trojan Vulnerabilities in UAV Autonomous Landing
By: Reza Ahmari , Ahmad Mohammadi , Vahid Hemmati and more
Potential Business Impact:
Finds hidden tricks that fool flying cars.
This study investigates the vulnerabilities of autonomous navigation and landing systems in Urban Air Mobility (UAM) vehicles. Specifically, it focuses on Trojan attacks that target deep learning models, such as Convolutional Neural Networks (CNNs). Trojan attacks work by embedding covert triggers within a model's training data. These triggers cause specific failures under certain conditions, while the model continues to perform normally in other situations. We assessed the vulnerability of Urban Autonomous Aerial Vehicles (UAAVs) using the DroNet framework. Our experiments showed a significant drop in accuracy, from 96.4% on clean data to 73.3% on data triggered by Trojan attacks. To conduct this study, we collected a custom dataset and trained models to simulate real-world conditions. We also developed an evaluation framework designed to identify Trojan-infected models. This work demonstrates the potential security risks posed by Trojan attacks and lays the groundwork for future research on enhancing the resilience of UAM systems.
Similar Papers
CNN+Transformer Based Anomaly Traffic Detection in UAV Networks for Emergency Rescue
Machine Learning (CS)
Protects flying robots from hackers using smart tech.
Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Cryptography and Security
Finds ways to hack flying robots using their own code.
An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Cryptography and Security
Keeps flying robot groups safe from hackers.