We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for runtime system analysis, now including security threat detection. R2U2 is designed to continuously monitor inputs from on-board components such as the GPS, the ground control station, other sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for Linear and Metric Temporal Logics for property monitoring...
Cyber–physical systems (CPS) for device-to-device (D2D) communications are gaining prominence in tod...
International audienceUnmanned aerial vehicles (UAVs) networks have not yet received considerable re...
Software is the crux of many commercial, industrial and military systems. The software systems need ...
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of s...
We present R2U2 (Realizable, Responsive, Unobtrusive Unit), a hardware-supported tool and framework ...
R2U2 (Realizable, Responsive, Unobtrusive Unit) is an extensible framework for runtime System Health...
For unmanned aerial systems (UAS) to be successfully deployed and integrated within the national air...
For unmanned aerial systems (UAS) to be successfully deployed and integrated within the national air...
R2U2 (Realizable, Responsive, Unobtrusive Unit) is a hardware-supported tool and framework for the r...
The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 ...
In this paper the general susceptibilities of Unmanned Aerial Vehicles (UAVs) against modern-cyber t...
Unmanned Aerial Systems (UAS) can only be deployed if they can effectively complete their mission an...
In the last decades, Unmanned Aerial Vehicles (UAVs) are finding more and more fields of application...
Unmanned aerial systems (UASs) can only be deployed if they can effectively complete their missions ...
With the increasing power and convenience offered by the use of embedded systems in control applicat...
Cyber–physical systems (CPS) for device-to-device (D2D) communications are gaining prominence in tod...
International audienceUnmanned aerial vehicles (UAVs) networks have not yet received considerable re...
Software is the crux of many commercial, industrial and military systems. The software systems need ...
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of s...
We present R2U2 (Realizable, Responsive, Unobtrusive Unit), a hardware-supported tool and framework ...
R2U2 (Realizable, Responsive, Unobtrusive Unit) is an extensible framework for runtime System Health...
For unmanned aerial systems (UAS) to be successfully deployed and integrated within the national air...
For unmanned aerial systems (UAS) to be successfully deployed and integrated within the national air...
R2U2 (Realizable, Responsive, Unobtrusive Unit) is a hardware-supported tool and framework for the r...
The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 ...
In this paper the general susceptibilities of Unmanned Aerial Vehicles (UAVs) against modern-cyber t...
Unmanned Aerial Systems (UAS) can only be deployed if they can effectively complete their mission an...
In the last decades, Unmanned Aerial Vehicles (UAVs) are finding more and more fields of application...
Unmanned aerial systems (UASs) can only be deployed if they can effectively complete their missions ...
With the increasing power and convenience offered by the use of embedded systems in control applicat...
Cyber–physical systems (CPS) for device-to-device (D2D) communications are gaining prominence in tod...
International audienceUnmanned aerial vehicles (UAVs) networks have not yet received considerable re...
Software is the crux of many commercial, industrial and military systems. The software systems need ...