Cyber-Physical // Drone & Robotics Security

Drone & Robotics Security

This domain covers cyber-physical attack surfaces where software, telemetry, radios, firmware and operator workflows all meet the same control loop. The work is not just about finding one exposed service. It is about understanding how autonomy, remote control, telemetry, companion compute and trust in field operations can be bent, degraded, spoofed or taken over.

7 focus areascyber-physicalpublic references

Why attackers care about this surface

Drones and robots collapse several security domains into one operational stack: firmware integrity, flight-control logic, telemetry exposure, remote management, mission planning, companion-computer trust and the human operator in the loop. A weakness in one layer can turn into loss of navigation integrity, unsafe movement, sensor spoofing, denied mission execution, operator deception or direct control-path compromise.

In practice that means the assessment has to move across layers. You may start at a radio link or a management interface, pivot into a companion computer, then validate what that means for the autopilot, the vehicle state and the mission outcome. The key question is always the same: what commands, assumptions or safety gates can an attacker influence from the outside?

Primary cyber-physical attack paths

surface

Telemetry & control links

Assess MAVLink exposure, message trust, replay conditions, weakly separated control channels and whether external traffic can influence movement, mission state or operator confidence.

surface

Companion computers

Pressure-test Linux-based companion nodes for weak services, key leakage, unsafe APIs, serial bridge abuse and privileged routes into navigation, autonomy or actuator-adjacent logic.

surface

Autopilot & firmware trust

Review update paths, parameter persistence, boot assumptions, developer interfaces and what a malicious or altered build can change once it reaches the vehicle.

surface

ROS 2 / robot middleware

Map graph exposure, node trust, topic abuse, data injection, bridge exposure and unsafe links between robotics middleware and safety-relevant motion components.

surface

Sensors & navigation inputs

Look at GPS dependence, visual or range-based perception, spoofable state inputs and what the platform does when it receives believable but hostile data.

surface

Mission tooling & operator workflow

Review mission planners, field laptops, configuration exports, radio setup and support tooling because operator-side compromise is often the cleanest route into the platform.

How to approach the assessment

Start by drawing the control chain end to end: ground station, radio path, base station, relay services, companion compute, autopilot, sensors and actuators. Then identify where commands originate, how trust is established, which channels are authenticated, what is signed, what is merely accepted and which faults degrade into unsafe but still “valid” behavior.

On mature targets, spend time on protocol visibility and message boundaries rather than only on web or host findings. On smaller fielded platforms, the fastest wins often sit in configuration inheritance, exposed serial interfaces, weak maintenance habits or over-trusted integration scripts.

What success can look like for an attacker

impact

Control-path manipulation

Mission outcomes change because the platform accepts hostile commands, altered parameters or trusted-but-false operational state.

impact

Telemetry deception

Operators keep making decisions on top of hostile or stale data because the visualized state still looks believable.

impact

Companion pivot

A foothold on the support computer becomes a bridge into navigation, planning, media handling, sensor processing or actuator-adjacent logic.

impact

ROS graph exposure

Unsafe node trust, open topics or weak bridges let external influence reach motion, planning or perception layers indirectly.

impact

Operator workstation compromise

The cleanest path is sometimes not the airframe or robot at all, but the field laptop, mission planner or maintenance workflow feeding it.

impact

Safety bypass by integration drift

Real risk often appears where one component assumes another component already validated trust, identity or safe state.

Reference links

Where to pivot when the vehicle is only part of the story

related

Network

Use it when the vehicle stack depends on reachable management, relay or internal service infrastructure.

related

Advanced

Return to the specialist domain hub for mobile, cloud, IoT, OT and other high-context surfaces.

related

AI Security

Use it when autonomy, perception or agentic decision layers add model-driven risk on top of the control plane.