ArXiv TLDR

Threat-Oriented Digital Twinning for Security Evaluation of Autonomous Platforms

🐦 Tweet
2604.25757

Thomas J. Neubert, Laxima Niure Kandel, Berker Peköz

cs.CRcs.AIcs.ROeess.SY

TLDR

This paper introduces a threat-oriented digital twinning methodology to evaluate the cybersecurity of learning-enabled autonomous platforms, enabling reproducible testing.

Key contributions

  • Presents a threat-oriented digital twinning methodology for autonomous platform cybersecurity.
  • Instantiates an open-source, modular digital twin of a representative autonomy stack.
  • Provides a reproducible design pattern for testing threats like spoofing, replay, and adversarial ML.
  • Architecture is applicable to UAV and space systems, not just ground-based platforms.

Why it matters

This methodology addresses the challenge of limited access to operational platforms for secure autonomy research. It provides a reproducible, open-source scaffold for cybersecurity evaluation, enabling critical studies across UAV and space domains.

Original Abstract

Open, unclassified research on secure autonomy is constrained by limited access to operational platforms, contested communications infrastructure, and representative adversarial test conditions. This paper presents a threat-oriented digital twinning methodology for cybersecurity evaluation of learning-enabled autonomous platforms. The approach is instantiated as an open-source, modular twin of a representative autonomy stack with separated sensing, autonomy, and supervisory-control functions; confidence-gated multi-modal perception; explicit command and telemetry trust boundaries; and runtime hold-safe behavior. The contribution is methodological: a reproducible design pattern that translates threat analysis into observable, controllable tests for spoofing, replay, malformed-input injection, degraded sensing, and adversarial ML stress. Although the implemented proxy is ground based, the architecture is intentionally framed around stack elements shared with UAV and space systems, including constrained onboard compute, intermittent or high-latency links, probabilistic perception, and mission-critical recovery behavior. The result is an implementable research scaffold for dependable and secure autonomy studies across UAV and space domains.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.