Game of Drones - Detecting Streamed POI from Encrypted FPV Channel

Drones have created a new threat to people's privacy. We are now in an era in which anyone with a drone equipped with a video camera can use it to invade a subject's privacy by streaming the subject in his/her private space over an encrypted first person view (FPV) channel. Although many methods have been suggested to detect nearby drones, they all suffer from the same shortcoming: they cannot identify exactly what is being captured, and therefore they fail to distinguish between the legitimate use of a drone (for example, to use a drone to film a selfie from the air) and illegitimate use that invades someone's privacy (when the same operator uses the drone to stream the view into the window of his neighbor's apartment), a distinction that in some cases depends on the orientation of the drone's video camera rather than on the drone's location. In this paper we shatter the commonly held belief that the use of encryption to secure an FPV channel prevents an interceptor from extracting the POI that is being streamed. We show methods that leverage physical stimuli to detect whether the drone's camera is directed towards a target in real time. We investigate the influence of changing pixels on the FPV channel (in a lab setup). Based on our observations we demonstrate how an interceptor can perform a side-channel attack to detect whether a target is being streamed by analyzing the encrypted FPV channel that is transmitted from a real drone (DJI Mavic) in two use cases: when the target is a private house and when the target is a subject.

[1]  Yali Liu,et al.  Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  Hao Wu,et al.  Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.

[3]  Biswanath Mukherjee,et al.  Video Streaming Forensic - Content Identification with Traffic Snooping , 2010, ISC.

[4]  Tadayoshi Kohno,et al.  Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.

[5]  Peter D. Symes Video Compression , 1998 .

[6]  D. Marpe,et al.  Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.

[7]  Vitaly Shmatikov,et al.  Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.

[8]  Charles V. Wright,et al.  Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[9]  Matthew Peacock,et al.  Towards detection and control of civilian unmanned aerial vehicles , 2013 .

[10]  Peter Wellig,et al.  Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.

[11]  Brian D. Rigling,et al.  Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV) , 2008, SPIE Defense + Commercial Sensing.

[12]  Andrew Reed,et al.  Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connections , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[13]  Djordje Mitrovic Video Compression , 2006 .

[14]  Andrew Reed,et al.  Identifying HTTPS-Protected Netflix Videos in Real-Time , 2017, CODASPY.

[15]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[16]  Fabian Monrose,et al.  Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks , 2011, 2011 IEEE Symposium on Security and Privacy.

[17]  Ivan Martinovic,et al.  Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones , 2017, NDSS.

[18]  Raheem A. Beyah,et al.  Information Leakage in Encrypted IP Video Traffic , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[19]  Keith Jack,et al.  Video Demystified: A Handbook for the Digital Engineer , 1993 .

[20]  B.D. Rigling,et al.  Low-Cost Acoustic Array for Small UAV Detection and Tracking , 2008, 2008 IEEE National Aerospace and Electronics Conference.

[21]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[22]  Charles V. Wright,et al.  Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.

[23]  Vincent Lepetit,et al.  Flying objects detection from a single moving camera , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).