Muneeba Asif

PhD candidate — Cyber-Physical Systems & UAV Security · Florida International University

I develop frameworks that detect, categorize, and recover from attacks across the full UAV control loop. My work focuses on PWM integrity, multimodal side-channel fusion, and hardening IDS through adversarial data augmentation and reinforcement learning. I validate methods with hardware-in-the-loop, real hardware Trojan experiments, and flight tests.

Areas: UAV security · CPS · IDS · PWM integrity · Side-channels · Adversarial ML
Affiliation: Florida International University · CREPES
Funding & collaborations: AFRL · NSF · DOE · NSA (projects)

Selected highlights

SHIELD — multimodal detect, categorize, and PWM recovery (DSN 2025)
ConFIDe — control-fused IDS for PWM integrity (ASIA CCS)
Hardware Trojan detection — PWM/impedance side-channel IDS (99% ROC reported)
Google Scholar LinkedIn

Impact and Stealth Analysis of UAV Attacks

This is the core methodology that guides my experimental and modeling work. Table 1 lists common attack goals and affected signals.

The training and evaluation of intrusion detection systems for UAVs require attack data that capture both physical impact on flight and the ability to remain stealthy relative to sensor telemetry. I generate and validate attack vectors using simulation, adversarial ML, GAN-based data augmentation, reinforcement learning, and hardware-in-the-loop experiments. I evaluate analytics on two axes. First, impact — whether a vector causes measurable instability, trajectory deviation, or mission failure. Second, stealth — whether a vector bypasses sensor-only detectors while producing unsafe actuation.

Attack Goal Example Sensor Measurements Affected Impacted Actuators / Signals
GPS spoofing GPS position, fused velocity, heading Motor thrust allocation via PWM
GPS jamming Loss of GPS, increased IMU reliance Flight trajectory control; hover stability
False data injection Accelerometer, gyroscope, barometer Controller outputs → PWM commands
PWM manipulation / Hardware Trojan Controller-to-actuator command path Propeller motors; roll/pitch/yaw thrust
CPU / battery interference Power draw, CPU load, timing jitter Actuator timing and repeatability; control latency

Selected Projects

SHIELD
Detect · Categorize · Recover. Multimodal side-channel fusion and attack-specific PWM correction. Validated in HITL and flight scenarios.
DSN 2025 — collaborative project with ACyD lab
ConFIDe
Control-Fused Intrusion Detection that verifies PWM integrity and fuses control signals with sensor telemetry for robust detection.
ASIA CCS / public dataset released
SLEIGHT
GAN + RL based evasive input generator for testing IDS and evaluating stealth tradeoffs in real-time and SITL environments.
Simulator & MAVSDK integration
Hardware Trojan Side-Channel IDS
Impedance and PWM waveform side-channels used to detect hardware manipulation with high ROC metrics.
PID-Piper model retraining
Retrain LSTM models used by PID-Piper and generate frugally-deep compatible model JSONs for SITL inference.
SPARE
PWA replication prevention for Progressive Web Apps using encrypted timestamps and device ID rate limiting.

Selected Publications & Artifacts

DSN 2025 — Detect, categorize, recover with PWM correction
ASIA CCS — PWM integrity and control-fused detection
Impedance and PWM side-channel detection experiments
GAN-based augmentation and adversarial evaluation
Full research agenda and outlined RQs
Selected grants, awards, and roles

If you host these PDFs on a public server, update the links above to the published URLs so visitors can download them directly.