Wenyu Dong, Guangquan Xu, Shicheng Feng, Hongpeng Bai, Michael Sheng, Xi Zheng
{"title":"护卫无人机的保密性和完整性:可信的执行环境究竟能提供什么?","authors":"Wenyu Dong, Guangquan Xu, Shicheng Feng, Hongpeng Bai, Michael Sheng, Xi Zheng","doi":"10.1145/3763788","DOIUrl":null,"url":null,"abstract":"A UAV (Unmanned Aerial Vehicle), also commonly known as a drone, has a wide range of application scenarios and cutting-edge capabilities. Thanks to increasingly sophisticated software and hardware, algorithm, and system integration design, the comparatively tiny vehicle can now fully exploit its advantages in almost every field, which will continue to mature. Nonetheless, UAVs have revealed their particular vulnerability under the threat of sundry hostile attacks, which threaten the confidentiality, integrity, and availability of the system. To protect the confidentiality and integrity of UAVs, some researchers have found that Trusted Execution Environment (TEE) is a potential solution, which provides an independent processing environment for secure storage and computing. As the practice of fitting UAVs with TEE grows in popularity, legislation is beginning to acknowledge their capabilities and offer them special licenses. Some well-known companies, such as Dajiang Innovation and Qualcomm, have also adopted TEE on their UAV products to enhance security. In order to figure out what meaningful role TEE can play in this scenario, we conduct several investigations and attempt to draw inspiration from them. We first go over the most recent reviews of UAV security and privacy issues, so as to examine the confidentiality and integrity requirements. Then, we review the existing works for UAV confidentiality and integrity protection integrated with TEE in detail and further propose a taxonomy. We also examine the benefits, security issues, and prospects of TEE. After conducting a gap analysis, we offer some recommendations for potential future courses of action.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":28.0000,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Escorting the Confidentiality and Integrity of UAVs: What Exactly Can Trusted Execution Environment Offer?\",\"authors\":\"Wenyu Dong, Guangquan Xu, Shicheng Feng, Hongpeng Bai, Michael Sheng, Xi Zheng\",\"doi\":\"10.1145/3763788\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A UAV (Unmanned Aerial Vehicle), also commonly known as a drone, has a wide range of application scenarios and cutting-edge capabilities. Thanks to increasingly sophisticated software and hardware, algorithm, and system integration design, the comparatively tiny vehicle can now fully exploit its advantages in almost every field, which will continue to mature. Nonetheless, UAVs have revealed their particular vulnerability under the threat of sundry hostile attacks, which threaten the confidentiality, integrity, and availability of the system. To protect the confidentiality and integrity of UAVs, some researchers have found that Trusted Execution Environment (TEE) is a potential solution, which provides an independent processing environment for secure storage and computing. As the practice of fitting UAVs with TEE grows in popularity, legislation is beginning to acknowledge their capabilities and offer them special licenses. Some well-known companies, such as Dajiang Innovation and Qualcomm, have also adopted TEE on their UAV products to enhance security. In order to figure out what meaningful role TEE can play in this scenario, we conduct several investigations and attempt to draw inspiration from them. We first go over the most recent reviews of UAV security and privacy issues, so as to examine the confidentiality and integrity requirements. Then, we review the existing works for UAV confidentiality and integrity protection integrated with TEE in detail and further propose a taxonomy. We also examine the benefits, security issues, and prospects of TEE. After conducting a gap analysis, we offer some recommendations for potential future courses of action.\",\"PeriodicalId\":50926,\"journal\":{\"name\":\"ACM Computing Surveys\",\"volume\":\"23 1\",\"pages\":\"\"},\"PeriodicalIF\":28.0000,\"publicationDate\":\"2025-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Computing Surveys\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3763788\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Computing Surveys","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3763788","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Escorting the Confidentiality and Integrity of UAVs: What Exactly Can Trusted Execution Environment Offer?
A UAV (Unmanned Aerial Vehicle), also commonly known as a drone, has a wide range of application scenarios and cutting-edge capabilities. Thanks to increasingly sophisticated software and hardware, algorithm, and system integration design, the comparatively tiny vehicle can now fully exploit its advantages in almost every field, which will continue to mature. Nonetheless, UAVs have revealed their particular vulnerability under the threat of sundry hostile attacks, which threaten the confidentiality, integrity, and availability of the system. To protect the confidentiality and integrity of UAVs, some researchers have found that Trusted Execution Environment (TEE) is a potential solution, which provides an independent processing environment for secure storage and computing. As the practice of fitting UAVs with TEE grows in popularity, legislation is beginning to acknowledge their capabilities and offer them special licenses. Some well-known companies, such as Dajiang Innovation and Qualcomm, have also adopted TEE on their UAV products to enhance security. In order to figure out what meaningful role TEE can play in this scenario, we conduct several investigations and attempt to draw inspiration from them. We first go over the most recent reviews of UAV security and privacy issues, so as to examine the confidentiality and integrity requirements. Then, we review the existing works for UAV confidentiality and integrity protection integrated with TEE in detail and further propose a taxonomy. We also examine the benefits, security issues, and prospects of TEE. After conducting a gap analysis, we offer some recommendations for potential future courses of action.
期刊介绍:
ACM Computing Surveys is an academic journal that focuses on publishing surveys and tutorials on various areas of computing research and practice. The journal aims to provide comprehensive and easily understandable articles that guide readers through the literature and help them understand topics outside their specialties. In terms of impact, CSUR has a high reputation with a 2022 Impact Factor of 16.6. It is ranked 3rd out of 111 journals in the field of Computer Science Theory & Methods.
ACM Computing Surveys is indexed and abstracted in various services, including AI2 Semantic Scholar, Baidu, Clarivate/ISI: JCR, CNKI, DeepDyve, DTU, EBSCO: EDS/HOST, and IET Inspec, among others.