Game of Drones - Detecting Streamed POI from Encrypted FPV Channel
نویسندگان
چکیده
Drones have created a new threat to people’s privacy. We are now in an era in which anyone with a drone equipped with a video camera can use it to invade a subject’s privacy by streaming the subject in his/her private space over an encrypted first person view (FPV) channel. Although many methods have been suggested to detect nearby drones, they all suffer from the same shortcoming: they cannot identify exactly what is being captured, and therefore they fail to distinguish between the legitimate use of a drone (for example, to use a drone to film a selfie from the air ) and illegitimate use that invades someone’s privacy (when the same operator uses the drone to stream the view into the window of his neighbor’s apartment), a distinction that in some cases depends on the orientation of the drone’s video camera rather than on the drone’s location. In this paper we shatter the commonly held belief that the use of encryption to secure an FPV channel prevents an interceptor from extracting the POI that is being streamed. We show methods that leverage physical stimuli to detect whether the drone’s camera is directed towards a target in real time. We investigate the influence of changing pixels on the FPV channel (in a lab setup). Based on our observations we demonstrate how an interceptor can perform a side-channel attack to detect whether a target is being streamed by analyzing the encrypted FPV channel that is transmitted from a real drone (DJI Mavic) in two use cases: when the target is a private house and when the target is a subject.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملA mathematical model of the effect of subsidy transfer in cooperative advertising using differential game theory
This work deals with subsidy transfer from a manufacturer to a retailer through the distributor in cooperative advertising. While the retailer engages in local advertising, the manufacturer indirectly participates in retail advertising using advertising subsidy which is given to the distributor, who in turn transfers it to the retailer. The manufacturer is the Stackelberg game leader; the distr...
متن کاملRFC 5879 Heuristics for Detecting ESP - NULL
This document describes a set of heuristics for distinguishing IPsec ESP-NULL (Encapsulating Security Payload without encryption) packets from encrypted ESP packets. These heuristics can be used on intermediate devices, like traffic analyzers, and deep-inspection engines, to quickly decide whether or not a given packet flow is encrypted, i.e., whether or not it can be inspected. Use of these he...
متن کاملOptimized Pricing Decisions In a Multi-Level Supply Chain With Various Power and Channel Structures: A Game-Theoretic Approach
This article studies the optimization of pricing decisions in a supply chain with different channels under different power structure. Three different channel will be considered here; these include: the decentralized, the semi-integrated, and the integrated channel. There are two types of power balance structures for both the decentralized and the semi-integrated channels. The first type is a le...
متن کاملGame-Theoretic Approach for Pricing Decisions in Dual-Channel Supply Chain
In the current study, a dual-channel supply chain is considered containing one manufacturer and two retailers. It is assumed that the manufacturer and retailers have the same decision powers. A game-theoretic approach is developed to analyze pricing decisions under the centralized and decentralized scenarios. First, the Nash model is established to obtain the equilibrium decisions in the decent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.03074 شماره
صفحات -
تاریخ انتشار 2018