自律型ドローンの重大なセキュリティ脆弱性を発見(UC Irvine Researchers Expose Critical Security Vulnerability in Autonomous Drones)

2025-02-25 カリフォルニア大学アーバイン校(UCI)

カリフォルニア大学アーバイン校の研究チームが、自律飛行ドローンのセキュリティ上の重大な脆弱性を明らかにしました。この脆弱性は、カメラベースの自律ターゲット追跡機能(「アクティブトラック」等)を悪用するもので、特別な模様を描いた傘を使ってドローンを意図的に誘導し、近づかせて捕獲したり衝突させたりできるというものです。この攻撃は「FlyTrap」と名付けられ、物理世界で機能し外部通信や信号は不要で、さまざまな環境条件でも成立します。研究チームはこの手法を公開し、製造元のDJIやHoverAirに責任ある開示を行いました。公共の安全や国境警備、法執行で使用されるドローンにも重大な影響があると警告しています。成果は米国のセキュリティ会議で発表予定です。

自律型ドローンの重大なセキュリティ脆弱性を発見(UC Irvine Researchers Expose Critical Security Vulnerability in Autonomous Drones)
UC Irvine computer scientists used the field at the campus’s Anteater Recreation Center to demonstrate their FlyTrap attack on autonomous drones. Ordinary umbrellas with AI-generated designs can trick the aircraft into moving steadily closer to the umbrella holder, who can then capture them with nets or cause them to crash. The FlyTrap attack methodology spotlights a vulnerability in drone technology utilized in a variety of law enforcement, military and security applications. Shaoyuan Xie / UC Irvine

<関連情報>

FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems

Shaoyuan Xie, Mohamad Habib Fakih, Junchi Lu, Fayzah Alshammari, Ningfei Wang, Takami Sato, Halima Bouzidi, Mohammad Abdullah Al Faruque, Qi Alfred Chen
arXiv  last revised 28 Jan 2026 (this version, v2)
DOI:https://doi.org/10.48550/arXiv.2509.20362

Abstract

Autonomous Target Tracking (ATT) systems, especially ATT drones, are widely used in applications such as surveillance, border control, and law enforcement, while also being misused in stalking and destructive actions. Thus, the security of ATT is highly critical for real-world applications. Under the scope, we present a new type of attack: distance-pulling attacks (DPA) and a systematic study of it, which exploits vulnerabilities in ATT systems to dangerously reduce tracking distances, leading to drone capturing, increased susceptibility to sensor attacks, or even physical collisions. To achieve these goals, we present FlyTrap, a novel physical-world attack framework that employs an adversarial umbrella as a deployable and domain-specific attack vector. FlyTrap is specifically designed to meet key desired objectives in attacking ATT drones: physical deployability, closed-loop effectiveness, and spatial-temporal consistency. Through novel progressive distance-pulling strategy and controllable spatial-temporal consistency designs, FlyTrap manipulates ATT drones in real-world setups to achieve significant system-level impacts. Our evaluations include new datasets, metrics, and closed-loop experiments on real-world white-box and even commercial ATT drones, including DJI and HoverAir. Results demonstrate FlyTrap’s ability to reduce tracking distances within the range to be captured, sensor attacked, or even directly crashed, highlighting urgent security risks and practical implications for the safe deployment of ATT systems.

1600情報工学一般
ad
ad
Follow
ad
タイトルとURLをコピーしました