2017
DOI: 10.1007/s10703-017-0275-x
|View full text |Cite
|
Sign up to set email alerts
|

R2U2: monitoring and diagnosis of security threats for unmanned aerial systems

Abstract: We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for runtime system analysis, now including security threat detection. R2U2 is designed to continuously monitor inputs from on-board components such as the GPS, the ground control station, other sensor readings, actuator outputs, and flight software status. By simult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(31 citation statements)
references
References 35 publications
0
29
0
Order By: Relevance
“…Signal Regular Expressions (SRE) [5]. The R2U2 tool [18] stands out in particular as it successfully brought a logic closely related to STL onto unmanned aerial systems as an external hardware implementation.…”
Section: Related Workmentioning
confidence: 99%
“…Signal Regular Expressions (SRE) [5]. The R2U2 tool [18] stands out in particular as it successfully brought a logic closely related to STL onto unmanned aerial systems as an external hardware implementation.…”
Section: Related Workmentioning
confidence: 99%
“…Hardware runtime monitors for realtime properties were presented by Jaksic et al [24], where monitors for STL specifications were implemented in an FPGA. Further work on FPGA implementations of real-time temporal specification was introduced with the tool R2U2 [34,35], an outline monitoring approach that allows for monitoring specifications in MTL including future-time specifications.…”
Section: Related Workmentioning
confidence: 99%
“…Otherwise, it would be straightforward to design an UAS to attack civilians (Steele, 2017). Researchers have already begun to simulate the reliability of UAS to various security threats by introducing a novel hybrid monitoring architecture consisting of software and hardware based modules (Moosbrugger et al, 2017).…”
Section: Public Authoritiesmentioning
confidence: 99%