attack 2025

Real-World Adversarial Attacks on RF-Based Drone Detectors

Omer Gazit , Yael Itzhakev , Yuval Elovici , Asaf Shabtai

0 citations · 20 references · arXiv

α

Published on arXiv

2512.20712

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

Structured I/Q perturbations optimized digitally reliably transfer to over-the-air conditions, reducing target drone detection across four drone types while preserving legitimate drone detection despite real-world channel effects and timing misalignment

CUAP (Class-specific Universal Adversarial Perturbation in I/Q domain)

Novel technique introduced


Radio frequency (RF) based systems are increasingly used to detect drones by analyzing their RF signal patterns, converting them into spectrogram images which are processed by object detection models. Existing RF attacks against image based models alter digital features, making over-the-air (OTA) implementation difficult due to the challenge of converting digital perturbations to transmittable waveforms that may introduce synchronization errors and interference, and encounter hardware limitations. We present the first physical attack on RF image based drone detectors, optimizing class-specific universal complex baseband (I/Q) perturbation waveforms that are transmitted alongside legitimate communications. We evaluated the attack using RF recordings and OTA experiments with four types of drones. Our results show that modest, structured I/Q perturbations are compatible with standard RF chains and reliably reduce target drone detection while preserving detection of legitimate drones.


Key Contributions

  • First physical adversarial attack targeting RF image-based object detection models (YOLO, Faster R-CNN), extending prior work beyond classification tasks
  • Novel CUAP optimization directly in the I/Q baseband domain, ensuring OTA physical realizability and compatibility with standard RF hardware without digital-to-RF pixel-space conversion
  • Time-shift-invariant, class-specific universal perturbation that suppresses target drone detection while preserving detection of legitimate drones in asynchronous multi-emitter scenarios

🛡️ Threat Analysis

Input Manipulation Attack

Crafts adversarial I/Q perturbation waveforms that, when transmitted over-the-air, cause ML-based object detection models (YOLO, Faster R-CNN) operating on RF spectrograms to fail to detect target drones at inference time — a physical universal adversarial example attack with novel I/Q-domain optimization ensuring hardware realizability.


Details

Domains
vision
Model Types
cnn
Threat Tags
white_boxblack_boxinference_timetargetedphysical
Datasets
Custom OTA RF recordings from four drone platforms
Applications
drone detectionrf-based object detectionuav identification