You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cheatsheets/Drone_Security_Cheat_Sheet.md
+25-2Lines changed: 25 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,15 +65,30 @@ If your drone is ever captured or lost, you should ensure that it's not physical
65
65
66
66
-**End-of-Life Decommissioning Risks** – Improperly decommissioned drones may retain sensitive data or be repurposed maliciously.
67
67
68
-
### 5. Sensor Security
68
+
### 5. System Integrity
69
+
70
+
A drone shares many properties with a classical IoT device when it comes to protecting integrity against unauthorized modifications of firmware, software, or configuration. Without these protections, attackers could inject malicious firmware or modify the control stack, gaining persistent and often invisible access - especially if the device is physically accessible to them (e.g., while it is in storage).
71
+
72
+
Fortunately, IoT also has a number of security controls for such cases:
73
+
74
+
-**Secure Boot** – Secure Boot ensures that the drone starts only with trusted software:
75
+
- Every piece of firmware is signed with a cryptographic key. Only signed software is allowed to run.
76
+
- A first-stage bootloader is immutable (in ROM or eFuse-locked code). It verifies signature on the second bootloader.
77
+
- Each component verifies the next component (e.g., second stage bootloader -> kernel -> application).
78
+
79
+
-**Measured Boot** – Measured Boot takes Secure Boot further by recording what software was loaded at each stage. This allows remote systems (like a fleet manager or ground station) to verify that the drone is running only trusted code. It also allows to authorize actions locally, such as releasing decryption keys only when the device boots properly.
80
+
81
+
-**Firmware Signing** – Ensures that firmware and configuration updates are signed with cryptographic signatures. Implement rollback protection to prevent attackers from loading older, vulnerable firmware versions. It's also a good idea to encrypt firmware packages, especially if they contain sensitive IP.
82
+
83
+
### 6. Sensor Security
69
84
70
85
With drones implementing control logic depending on how close they are to other drones or aerial vehicles, manipulating sensor data can be disastrous!
71
86
72
87
Attackers can manipulate drone sensors (GPS, cameras, altimeters) to feed incorrect data. Think of this more like how [stuxnet](https://en.wikipedia.org/wiki/Stuxnet) changed the speed of the Uranium centrifuges in Iran while still reporting the speed as normal.
73
88
74
89
To prevent this, there is new research being developed involving **watermarked signals** whose **entropy** can be used to determine if the sensor values are correct of not. Read more about this method [here](https://ieeexplore.ieee.org/abstract/document/9994719).
75
90
76
-
### 6. Logging & Monitoring
91
+
### 7. Logging & Monitoring
77
92
78
93
-**Inadequate Logging and Monitoring** – Without sufficient monitoring, security breaches or operational anomalies may go undetected.
79
94
@@ -178,3 +193,11 @@ There are multiple GitHub repos that help with drone attack [simulations](https:
178
193
-[Dynamic Watermarking in UAVs](https://ieeexplore.ieee.org/abstract/document/9994719)
179
194
180
195
-[GPS spoofing and prevention](https://www.okta.com/identity-101/gps-spoofing/)
0 commit comments