UC Irvine Uncovers Major Security Flaw in Drones

University of California - Irvine

Irvine, Calif., Feb. 25, 2026 — University of California, Irvine computer scientists have discovered a critical security vulnerability in autonomous target-tracking drones that could have far-reaching implications for public safety, border security and personal privacy. The UC Irvine team demonstrated how attackers could use an ordinary umbrella to manipulate drones, drawing the aircraft close enough to capture them or cause them to crash.

The researchers developed a novel physical-world attack framework that they call FlyTrap. It exploits deficiencies in camera-based, autonomous target-tracking technology that enables drones to follow selected targets without being directly controlled by humans. Also known as "active track" or "dynamic track" in consumer products, these AI-powered functions are increasingly deployed in applications including border control, security surveillance and law enforcement operations.

The team is sharing its findings and specifications for the FlyTrap attack platform in a paper presentation this week at the Network and Distributed System Security Symposium in San Diego.

"Autonomous target tracking represents both tremendous potential and significant risk," said paper co-author Alfred Chen, UC Irvine assistant professor of computer science. "While law enforcement and security agencies are adopting this technology for border patrol and public safety, it's also being misused by criminals for stalking and other malicious purposes. Our work is the first comprehensive security study of this widely deployed technology."

Chen's research group discovered what it calls a distance-pulling attack that physically draws victim drones closer to an attacker. An ordinary umbrella covered with a specifically designed visual pattern can deceive neural network tracking systems used by autonomous drones. The aircraft's computer logic interprets images on the umbrella as a person moving farther away, even though they're stationary. To maintain its tracking distance, the drone moves steadily closer to the umbrella holder, until the aircraft can be caught with a net or crashed. Unlike other possible attacks that simply cause loss of tracking, this novel approach enables complete elimination of drones through physical capture or collision.

The UC Irvine researchers' tests successfully demonstrated FlyTrap attacks on three commercial drones, the DJI Mini 4 Pro, the DJI Neo and the HoverAir X1. Results showed that an attack could pull drones close enough for capture using net guns or to induce direct physical crashes. The team has responsibly disclosed these vulnerabilities to manufacturers DJI and HoverAir.

The paper points to instances in which criminals could use a distance-pulling attack to evade detection by law enforcement drones. Unpiloted aircraft patrolling border zones could be similarly hampered by a FlyTrap-like attack. On the other hand, people being stalked could use the UC Irvine researchers' technique to eliminate a harassing drone.

"Our findings highlight urgent needs for security improvements in [autonomous target-tracking] systems before wider deployment in critical infrastructure," said lead author Shaoyuan Xie, a UC Irvine graduate student researcher in computer science. "If it's that easy to seize control over an autonomous drone, operating them in public or in critical security or law enforcement settings should be reconsidered."

The FlyTrap attack methodology achieves its objectives through the ordinary physical act of opening a portable umbrella. The system functions locally without the need for external signaling or wireless data connectivity. It can work in a variety of weather and lighting conditions, and it employs a progressive distance-pulling strategy and manipulates drone-tracking algorithms.

There is comprehensive documentation of the project, including a website , new datasets, metrics, demonstration videos , social media and an extended paper to support future security improvements in the field. All drone data and experiments were completed before Dec. 22, 2025.

In addition to Chen and Xie, team members were former UC Irvine doctoral students Ningfei Wang and Takami Sato; current UC Irvine graduate students Mohamad Habib Fakih, Junchi Lu and Fayzah Alshammari; current UC Irvine postdoctoral scholar Halima Bouzidi; and Mohammad Abdullah Al Faruque, UC Irvine professor of electrical engineering and computer science. The project received financial support from NASA and the National Science Foundation.

About the University of California, Irvine: Founded in 1965, UC Irvine is a member of the prestigious Association of American Universities and is ranked among the nation's top 10 public universities by U.S. News & World Report. The campus has produced five Nobel laureates and is known for its academic achievement, premier research, innovation and anteater mascot. Led by Chancellor Howard Gillman, UC Irvine has more than 36,000 students and offers 224 degree programs. It's located in one of the world's safest and most economically vibrant communities and is Orange County's second-largest employer, contributing $7 billion annually to the local economy and $8 billion statewide. For more on UC Irvine, visit www.uci.edu .

Media access: Radio programs/stations may, for a fee, use an on-campus studio with a Comrex IP audio codec to interview UC Irvine faculty and experts, subject to availability and university approval. For more UC Irvine news, visit news.uci.edu . Additional resources for journalists may be found at https://news.uci.edu/media-resources .

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.