Tech
SHIELD activated: Researchers build defense to protect drones from cyberattacks
Fooled into following a hacker’s rogue commands, a drone is liable to do any number of things. Fly erratically. Speed up. Slow down. Hang suspended in the air. Reverse course. Take a new course. And, most dangerously: Crash.
What the compromised drone cannot do, however, is regain control. Lost to its original assignment—whether it’s delivering a package, inspecting an aging bridge or monitoring the health of crops—the machine is essentially useless.
At FIU, cybersecurity researchers have developed a series of countermeasures to fight back mid-flight against hostile takeovers.
Because drones are essentially flying computers, they are subject to the same software and hardware exploitation as their land-bound counterparts. But current drone-defense techniques fail to monitor all possible vulnerabilities.
FIU’s technology, called SHIELD, is different. Keeping watch over the entire control system, it picks up on subtle cues of malicious activity. It then identifies the kind of attack—even the stealthiest ones that often slip under the radar—before launching an attack-specific recovery process. The findings were presented at the IEEE/IFIP International Conference on Dependable Systems and Networks.
“Without robust recovery mechanisms, a drone cannot complete its mission under attacks, because even if it is possible to detect the attacks, the mission often gets terminated as a fail-safe move,” said Mohammad Ashiqur Rahman, lead researcher and associate professor in FIU’s Knight Foundation School of Computing and Information Sciences.
“What’s important about our framework is that it helps the system recover, so the mission can be completed.”
Safeguarding the security of drones may soon become more important than ever before. This summer, the Federal Aviation Administration proposed expanding commercial drone use across industries. From Amazon deliveries to agriculture, the FAA expects more businesses to deploy unmanned aircraft, raising questions about safety in the face of increasingly sophisticated cyber threats.
Traditionally, attack detection has revolved around sensors that help the drone perceive its surroundings and fly safely. But these sensors can be easily manipulated. For example, in “GPS spoofing,” hackers transmit fake coordinates to trick the drone into taking a different trajectory.
Sophisticated cyberattacks, though, bypass the sensors and go straight for the control or actuation system, sneaking malware into the drone’s hardware.
“This is why a detection and recovery system that only takes into account the sensors misses the bigger picture,” says Muneeba Asif, Ph.D. candidate in Rahman’s research group and study author. “It will be blind to other attacks that happen across the system and at different levels.”
SHIELD goes further by monitoring the drone’s entire control system. It detects abnormalities not just in sensors but also in the hardware. For example, the battery and computer components reveal a lot. Sudden surges in battery power or overworked processors are strong indicators that an attack is in progress.
The research team, which also includes FIU students Jean Tonday Rodriguez and Mohammad Kumail Kazmi, compares their approach to how a doctor arrives at a final diagnosis. A symptom (in this case, sensor data) doesn’t always reveal the underlying cause of an illness. Physical evidence (what’s happening with the battery), though, can provide a better idea of what’s going on.
And, just as every diagnosis dictates a different treatment, the researchers also find each attack needed a more tailored recovery plan.
Through multiple hardware-in-the-loop simulations in the lab, researchers learned that every attack leaves behind a unique signature and impacts the drone‘s system differently. So, the team trained AI machine learning models to spot abnormalities in the data, use the data to classify the attack and roll out the prescribed recovery protocol. In the lab, all of this happened in less than a second. Average detection time was 0.21 seconds, and recovery 0.36 seconds.
Next, Rahman’s research group will scale up testing, preparing SHIELD for real-world deployment.
With drones poised to reshape commerce, infrastructure monitoring, disaster response and more, FIU researchers say securing them is no longer optional.
“Reliable and secure drones are the key to unlocking future advancements,” Rahman said. “It’s our hope this work can play a role in moving the industry forward.”
More information:
Muneeba Asif et al, “I will always be by your side”: A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles, 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2025). DOI: 10.1109/dsn64029.2025.00070
Citation:
SHIELD activated: Researchers build defense to protect drones from cyberattacks (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-shield-defense-drones-cyberattacks.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
This Backyard Smoker Delivers Results Even a Pitmaster Would Approve Of
While my love of smoked meats is well-documented, my own journey into actually tending the fire started just last spring when I jumped at the opportunity to review the Traeger Woodridge Pro. When Recteq came calling with a similar offer to check out the Flagship 1600, I figured it would be a good way to stay warm all winter.
While the two smokers have a lot in common, the Recteq definitely feels like an upgrade from the Traeger I’ve been using. Not only does it have nearly twice the cooking space, but the huge pellet hopper, rounded barrel, and proper smokestack help me feel like a real pitmaster.
The trade-off is losing some of the usability features that make the Woodridge Pro a great first smoker. The setup isn’t as quite as simple, and the larger footprint and less ergonomic conditions require a little more experience or patience. With both options, excellent smoked meat is just a few button presses away, but speaking as someone with both in their backyard, I’ve been firing up the Recteq more often.
Getting Settled
Photograph: Brad Bourque
Setting up the Recteq wasn’t as time-consuming as the Woodridge, but it was more difficult to manage on my own. Some of the steps, like attaching the bull horns to the lid, or flipping the barrel onto its stand, would really benefit from a patient friend or loved one. Like most smokers, you’ll need to run a burn-in cycle at 400 degrees Fahrenheit to make sure there’s nothing left over from manufacturing or shipping. Given the amount of setup time and need to cool down the smoker after, I would recommend setting this up Friday afternoon if you want to smoke on a Saturday.
Tech
Make the Most of Chrome’s Toolbar by Customizing It to Your Liking
The main job of Google Chrome is to give you a window to the web. With so much engaging content out there on the internet, you may not have given much thought to the browser framework that serves as the container for the sites you visit.
You’d be forgiven for still using the default toolbar configuration that was in place when you first installed Chrome. But if you take a few minutes to customize it, it can make a significant difference to your browsing. You can get quicker access to the key features you need, and you may even discover features you didn’t know about.
If you’re reading this in Chrome on the desktop, you can experiment with a few customizations right now—all it takes is a few clicks. Here’s how the toolbar in Chrome is put together, and all the different changes you can make.
The Default Layout
Take a look up at the top right corner of your Chrome browser tab and you’ll see two key buttons: One reveals your browser extensions (the jigsaw piece), and the other opens up your bookmarks (the double-star icon). There should also be a button showing a downward arrow, which gives you access to recently downloaded files.
Right away, you can start customizing. If you click the jigsaw piece icon to show your browser extensions, you can also click the pin button next to any one of these extensions to make it permanently visible on the toolbar. While you don’t want your toolbar to become too cluttered, it means you can put your most-used add-ons within easy reach.
For the extension icons you choose to have on the toolbar, you can choose the way they’re arranged, too: Click and drag on any of the icons to change its position (though the extensions panel itself has to stay in the same place). To remove an extension icon (without uninstalling the extension), right-click on it and choose Unpin.
Making Changes
Click the three dots up in the top right corner of any browser window and then Settings > Appearance > Customize your toolbar to get to the main toolbar customization panel, which has recently been revamped. Straight away you’ll see toggle switches that let you show or hide certain buttons on the toolbar.
Tech
The Piracy Problem Streaming Platforms Can’t Solve
“The trade-off isn’t only ethical or economic,” Andreaux adds. “It’s also about reliability, privacy and personal security.”
Abed Kataya, digital content manager at SMEX, a Beirut-based digital rights organization focused on internet policy in the Middle East and North Africa, says piracy in the region is shaped less by culture than by structural barriers.
“I see that piracy in MENA is not a cultural choice; rather, it has multiple layers,” Kataya tells WIRED Middle East.
“First, when the internet spread across the region, as in many other regions, people thought everything on it was free,” Kataya says. “This perception was based on the nature of Web 1.0 and 2.0, and how the internet was presented to people.”
Today, he says, structural barriers still lead many users towards illegal platforms. “Users began to watch online on unofficial streaming platforms for many reasons: lack of local platforms, inability to pay, bypassing censorship and, of course, to watch for free or at lower prices.”
Payment access also remains a major factor. “Not to mention that many are unbanked, do not have bank accounts, lack access to online payments, or do not trust paying with their cards and have a general distrust of online payments,” Kataya adds.
Algerian students also share external hard drives loaded with television series, while in Lebanon streaming passwords are frequently shared across households. In Egypt, large Telegram channels distribute content across different genres, including Korean dramas, classic Arab films and underground music.
“We grew up solving problems online,” says Mira. “When something is blocked, you find a way around it. It’s … a fundamental human instinct.”
Streaming Platforms Adapting
Andreaux says StarzPlay has tried to address some of the payment barriers that limit streaming adoption in the region. “StarzPlay recognized early that payment friction was a regional barrier to adoption,” he says. “That’s why we invested in flexible subscription models and alternative payment methods, including telecom-led billing options that make access easier across different markets.”
At the same time, international media companies are working together to combat piracy through the Alliance for Creativity and Entertainment (ACE), a coalition of film studios, television networks and streaming platforms that targets illegal distribution of films, television and sports content. Its members include global companies such as Netflix as well as regional players like OSN Group, which operates the streaming service OSN+ across the Middle East and North Africa.
Kataya notes that legitimate streaming platforms are still expanding across the region. “The user base of official streaming platforms has been growing in the region,” he says. “For example, Shahid, the Saudi platform, is expanding and Netflix has dedicated packages for the region.”
“Other players, like StarzPlay and local platforms in Egypt, are also finding their place,” Kataya adds. “Social media also plays a huge role, especially when a film is widely discussed or controversial.”
Piracy carries legal and security risks, Andreaux says. “Rather than just ‘free streaming’, piracy exposes consumers to malware and insecure payment channels,” he says. “It also weakens investment in local content by depriving creators of revenue and reducing jobs.”
But the structural barriers described by users across the region remain. For many viewers in North Africa and the Levant, the challenge is not choosing between piracy and legality—it is whether legitimate access exists at all.
-
Politics1 week agoPakistan carries out precision strikes on seven militant hideouts in Afghanistan
-
Business1 week agoEye-popping rise in one year: Betting on just gold and silver for long-term wealth creation? Think again! – The Times of India
-
Sports1 week agoKansas’ Darryn Peterson misses most of 2nd half with cramping
-
Entertainment1 week agoSaturday Sessions: Say She She performs "Under the Sun"
-
Entertainment1 week agoViral monkey Punch makes IKEA toy global sensation: Here’s what it costs
-
Tech1 week agoThe Supreme Court’s Tariff Ruling Won’t Bring Car Prices Back to Earth
-
Tech1 week agoThese Cheap Noise-Cancelling Sony Headphones Are Even Cheaper Right Now
-
Sports1 week agoFloyd Mayweather to come out of retirement again

