Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer...
Transcript of Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer...
![Page 1: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/1.jpg)
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Simon Birnbach, Richard Baker, Ivan Martinovic
2017 NDSS
![Page 2: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/2.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2
Let’s Talk About Drones
![Page 3: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/3.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2
Let’s Talk About Drones
![Page 4: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/4.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2
Let’s Talk About Drones
![Page 5: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/5.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2
Let’s Talk About Drones
![Page 6: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/6.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 2
Let’s Talk About Drones
$399
![Page 7: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/7.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 3
Why Should We Care?■ Ignore physical access restrictions ■ High-quality camera equipment ■ Spy tools in the hands of everybody ■ Privacy invasions by drones get more common
![Page 8: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/8.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 4
Privacy invasion attacks
![Page 9: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/9.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS
■ Various approaches Optical sensors Acoustic cameras High-frequency radar
■ Expensive hardware needed ■ Goal: Design cheap detection system
Radio Frequency
$3768
$$$
5
How to Detect?
![Page 10: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/10.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 6
Adversary Model■ Unmodified consumer drone
Controlled over WiFi Streams live video
■ Objective:Capture video through window
Line-of-Sight (LOS) to window needed ■ No direct access to premises
dl
ds
OutsideInside
dl: Launch distance ds: Surveillance distance
![Page 11: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/11.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 7
General Idea■ Off-the-shelf WiFi receiver ■ Placement in window
Guarantees LOS ■ Access restrictions
Drone starts further away Forces attacker to fly higher
■ Challenges Received signal strength (RSS)! noisy data Unknown flight behavior Early detection
dl
ds
OutsideInside
dl: Launch distance ds: Surveillance distance
![Page 12: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/12.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 8
System Overview■ Pre-processing ■ Statistical tests
Presence ! Drone nearby
■ Attack analysis Attack phases! Approach! Surveillance! Escape Proximity! Closeness to window
![Page 13: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/13.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 9
Pre-Processing
![Page 14: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/14.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 10
Statistical Tests
![Page 15: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/15.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 11
Statistical Tests
Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters)
Receiver Drone
![Page 16: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/16.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 11
Statistical Tests
Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters)
Receiver
Ground-basedtransmitter
![Page 17: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/17.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 12
Statistical Tests
Attacker has to: …overcome physical access restrictions ! Drone is flying high above ground …establish LOS to the window ! changes of multipath effects ! we expect far less multipath effects due to strong LOS component (compared with ground-based transmitters) …move towards the window ! RSS increases as drone approaches
■ Detection method based on statistical tests: Testing for flying: Closer to free-space propagation than non-flying transmitters Testing for approaching & movement: significant RSS changes as distance to receiver varies
![Page 18: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/18.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 13
Statistical Tests■ Free-space propagation (FSP)
RSS depends on distance and receiver noise Only noise varies in short time frame ws (<0.1s)
■ Movement More distance variation than noise in longer interval wl (>1s)
■ Compute standard deviation of RSS measurements ■ Noise threshold t
Derived from background noise
![Page 19: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/19.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14
Statistical Tests
![Page 20: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/20.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14
Statistical Tests
Noise threshold
![Page 21: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/21.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14
Statistical Tests
FSP test
![Page 22: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/22.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 14
Statistical Tests
Movementtest
![Page 23: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/23.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 15
Attack Analysis
![Page 24: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/24.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 16
Attack Analysis■ Approach detection
Increase in RSS difference shows drone is approaching ■ Proximity alert
User gets warned if RSS difference exceeds threshold
![Page 25: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/25.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 17
System Output
![Page 26: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/26.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 18
Experiment Setup■ Executed in secluded farmhouse ■ Drones: DJI Phantom 3 Standard, Parrot Bebop ■ Receiver: Raspberry Pi with WiPi stick mounted in window
![Page 27: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/27.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 18
Experiment Setup■ Executed in secluded farmhouse ■ Drones: DJI Phantom 3 Standard, Parrot Bebop ■ Receiver: Raspberry Pi with WiPi stick mounted in window
$40
![Page 28: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/28.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 19
System Challenges
Normal behavior
Erraticapproach
Not constantlyapproaching
EstablishesLOS very late
![Page 29: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/29.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 19
System Challenges
![Page 30: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/30.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
![Page 31: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/31.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
![Page 32: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/32.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
![Page 33: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/33.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
FSP test
![Page 34: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/34.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Movementtest
![Page 35: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/35.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Noise threshold
![Page 36: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/36.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Launch
![Page 37: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/37.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Approach
![Page 38: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/38.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Surveillance
![Page 39: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/39.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 20
Straight Approach
Escape
![Page 40: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/40.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 21
Detection Distances
![Page 41: Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Dronessconce.ics.uci.edu/203-W17/drones.pdf · Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones,](https://reader030.fdocuments.in/reader030/viewer/2022040900/5e6ec17184c80d19d55c53ea/html5/thumbnails/41.jpg)
Simon Birnbach, Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones, 2017 NDSS 22
Conclusion■ Developed method to detect drone privacy invasions ■ Implemented on cheap hardware ■ Real-world experiment with variety of approach patterns
shows feasibility ■ Good performance, minimal detection distance 48m
Thank you for your attention!
Questions?