Abstract
Drones have created a new threat to people’s privacy. We are now in an era in which anyone with a drone equipped with a video camera can use it to invade a subject privacy by filming the subject in his/her private space using encrypted First Person View (FPV) channel. Although many methods have been suggested to detect a nearby drone, they all suffer from the same shortcoming: they cannot detect what specifically is being captured and therefore they fail to distinguish between the legitimate use of a drone that does not invade a subject’s privacy (for example, neighbor’s drone flying and shoot his garden) and illegitimate use (same drone shooting the subject’s property), where in many cases depends on the orientation of the drone’s video camera rather than on the drone’s location. In this paper we present a method that utilizes a flicker in order to detect whether the drone’s camera is directed towards the private space by analyzing the encrypted video stream sent from the drone in real time. We investigate the influence of changing pixels on the transmitted traffic (in a lab setup). We leverage our conclusions and demonstrate how an interceptor can apply a side-channel attack to detect that a subject is video streamed by DJI Mavic drone from its encrypted FPV channel when the subject is located inside a private house.
Video - https://youtu.be/3wEsbafsUxg.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Airmon-ng: https://www.aircrack-ng.org/doku.php?id=airmon-ng
360, L.: An update on drone privacy concerns. https://www.law360.com/articles/848165/an-update-on-drone-privacy-concerns
Androidauthority: 8 fun drones you can control with your smartphone
Ben-Netanel, R., Nassi, B., Shamir, A., Elovici, Y.: Detecting spying drones. IEEE Secur. Priv. (2020). https://doi.org/10.1109/msec.2020.3034171
Birnbach, S., Baker, R., Martinovic, I.: Wi-fly?: detecting privacy invasion attacks by consumer drones. NDSS (2017)
Busset, J.: Detection and tracking of drones using advanced acoustic cameras. In: Unmanned/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications, vol. 9647, p. 96470F. International Society for Optics and Photonics (2015)
Case, E.E., Zelnio, A.M., Rigling, B.D.: Low-cost acoustic array for small uav detection and tracking. In: Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, pp. 110–113. IEEE (2008)
DJI: Mavic pro. https://www.dji.com/mavic
DJI: Spark remote controller. https://store.dji.com/product/spark-remote-controller
Eshel, T.: Mobile radar optimized to detect UAVS, precision guided weapons. Defense Update (2013)
Guri, M., Bykhovsky, D.: Air-jumper: covert air-gap exfiltration/infiltration via security cameras and infrared (IR). Comput. Secur. 82, 15–29 (2019)
Insider, B.: Commercial unmanned aerial vehicle (UAV) market analysis. http://www.businessinsider.com/commercial-uav-market-analysis-2017-8
Intel: Intel dual band wireless ac 8265. http://ark.intel.com/products/94150/Intel-Dual-Band-Wireless-AC-8265
Jack, K.: Video Demystified: A Handbook for the Digital Engineer. Elsevier (2011)
Liu, Y., Sadeghi, A.R., Ghosal, D., Mukherjee, B.: Video streaming forensic-content identification with traffic snooping. In: Burmester, M., Tsudik, G., Magliveras, S., Ilic, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 129–135. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_11
Mail, D.: Woman grabs gun shoots nosy neighbour’s drone. http://www.dailymail.co.uk/news/article-4283486/Woman-grabs-gun-shoots-nosy-neighbour-s-drone.html
Mitrovic, D.: Video Compression. University of Edinburgh
Nassi, B., Bitton, R., Masuoka, R., Shabtai, A., Elovici, Y.: Sok: security and privacy in the age of commercial drones. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 73–90. IEEE Computer Society, Los Alamitos, CA, USA (2021). https://doi.org/10.1109/SP40001.2021.00005, https://doi.ieeecomputersociety.org/10.1109/SP40001.2021.00005
Nassi, B., Ben-Netanel, R., Shamir, A., Elovici, Y.: Drones’ cryptanalysis-smashing cryptography with a flicker. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1397–1414. IEEE (2019)
Nassi, B., Shamir, A., Elovici, Y.: Xerox day vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2), 415–430 (2018)
News, N.: Case dismissed against William H. merideth, kentucky man arrested for shooting down drone. http://www.nbcnews.com/news/us-news/case-dismissed-against-william-h-merideth-kentucky-man-arrested-shooting-n452281
News, N.: Kentucky man arrested after shooting down neighbor’s drone. http://www.nbcnews.com/news/us-news/not-my-backyard-man-arrested-after-shooting-drone-down-n402271
Ostermann, J.: Video coding with h. 264/avc: tools, performance, and complexity. IEEE Circ. Syst. Mag. 4(1), 7–28 (2004)
Parrot: Parrot skycontroller. https://www.parrot.com/global/accessories/drones/parrot-skycontroller#parrot-skycontroller
Peacock, M., Johnstone, M.N.: Towards detection and control of civilian unmanned aerial vehicles (2013)
Post, N.Y.: Husband uses drone to catch cheating wife (2016). https://nypost.com/2016/11/16/husband-uses-drone-to-catch-cheating-wife/
Reed, A., Klimkowski, B.: Leaky streams: identifying variable bitrate dash videos streamed over encrypted 802.11 n connections. In: 2016 13th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 1107–1112. IEEE (2016)
Reed, A., Kranch, M.: Identifying https-protected netflix videos in real-time. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 361–368. ACM (2017)
Rozantsev, A., Lepetit, V., Fua, P.: Flying objects detection from a single moving camera. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4128–4136 (2015)
Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T., et al.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: USENIX Security Symposium, pp. 55–70 (2007)
Schuster, R., Shmatikov, V., Tromer, E.: Beauty and the burst: remote identification of encrypted video streams. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1357–1374. USENIX Association, Vancouver, BC (2017). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schuster
Vasquez, J.R., Tarplee, K.M., Case, E.E., Zelnio, A.M., Rigling, B.D.: Multisensor 3d tracking for counter small unmanned air vehicles (CSUAV). In: Proceedings of the SPIE, vol. 6971, p. 697107 (2008)
Wampler, C., Uluagac, S., Beyah, R.: Information leakage in encrypted IP video traffic. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–7 (2015). https://doi.org/10.1109/GLOCOM.2015.7417767
Washington, N.: Virginia woman shoots down drone near actor robert duvalls home. http://www.nbcwashington.com/news/local/Virginia-Woman-Shoots-Down-Drone-Near-Actor-Robert-Duvalls-Home-391423411.html
White, A.M., Matthews, A.R., Snow, K.Z., Monrose, F.: Phonotactic reconstruction of encrypted VOIP conversations: hookt on fon-iks. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2011)
Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the h. 264/avc video coding standard. IEEE Trans. Circ. Syst. Video Technol. 13(7), 560–576 (2003)
World, N.: You cant shoot a drone so what can you do if it invades your privacy. http://www.networkworld.com/article/2941952/opensource-subnet/you-cant-shoot-a-drone-so-what-can-you-do-if-it-invades-your-privacy.html
Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VOIP conversations. In: IEEE Symposium on Security and Privacy, 2008. SP 2008, pp. 35–49. IEEE (2008)
Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? USENIX Secur. Symp. 3, 43–54 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Nassi, B., Ben-Netanel, R., Shamir, A., Elovici, Y. (2021). Game of Drones - Detecting Spying Drones Using Time Domain Analysis. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2021. Lecture Notes in Computer Science(), vol 12716. Springer, Cham. https://doi.org/10.1007/978-3-030-78086-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-78086-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78085-2
Online ISBN: 978-3-030-78086-9
eBook Packages: Computer ScienceComputer Science (R0)