Access the full text.
Sign up today, get DeepDyve free for 14 days.
T Reinbacher, J Brauer, M Horauer, A Steininger, S Kowalewski (2014)
Runtime verification of microcontroller binary codeSci Comput Program, 80
D Heffernan, C Macnamee, P Fogarty (2014)
Runtime verification monitoring for automotive embedded systems using the iso 26262 functional safety standard as a guide for the definition of the monitored propertiesIET Softw, 8
AJ Kerns, DP Shepard, JA Bhatti, TE Humphreys (2014)
Unmanned aircraft capture and control via GPS spoofingJ Field Robot, 31
DP Shepard, JA Bhatti, TE Humphreys (2012)
Drone hackGPS World, 23
ML Psiaki, TE Humphreys (2016)
GNSS spoofing and detectionProc IEEE, 104
PO Meredith, D Jin, D Griffith, F Chen, G Roşu (2012)
An overview of the MOP runtime verification frameworkInt J Softw Tools Technol Transf, 14
A Jafarnia-Jahromi, A Broumandan, J Nielsen, G Lachapelle (2012)
GPS vulnerability to spoofing threats and a review of antispoofing techniquesInt J Navig Obs, 2012
R Koymans (1990)
Specifying real-time properties with metric temporal logicReal-time Syst, 2
J Schumann, KY Rozier, T Reinbacher, OJ Mengshoel, T Mbaya, C Ippolito (2015)
Towards real-time, on-board, hardware-supported sensor and software health management for unmanned aerial systemsInt J Progn Health Manag, 6
OJ Mengshoel, M Chavira, K Cascio, S Poll, A Darwiche, S Uckun (2010)
Probabilistic model-based diagnosis: an electrical power system case studyIEEE Trans Syst Man Cyberne Part A Syst Hum, 40
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for runtime system analysis, now including security threat detection. R2U2 is designed to continuously monitor inputs from on-board components such as the GPS, the ground control station, other sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for Linear and Metric Temporal Logics for property monitoring and Bayesian networks for diagnosis of system health during runtime. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.
Formal Methods in System Design – Springer Journals
Published: Apr 12, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.