From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
Proceedings of the 29th USENIX Security Symposium (USENIX Security) 2020.
areas
Security,
Cyber-Physical Systems,
Program Analysis
abstract
With wide adoption of robotic aerial vehicles (RAVs), their accidents increasingly occur, calling for in-depth investigation of such accidents. Unfortunately, an inquiry to "why did my drone crash" often ends up with nowhere, if the root cause lies in the RAV’s control program, due to the key challenges in evidence and methodology: (1) Current RAVs' flight log only records high-level vehicle control states and events, without recording control program execution; (2) The capability of “connecting the dots” - from controller anomaly to program variable corruption to program bug location - is lacking. To address these challenges, we develop Mayday, a cross-domain post-accident investigation framework by mapping control model to control program, enabling (1) in-flight logging of control program execution, and (2) traceback to the control-semantic bug that led to an accident, based on control- and program-level logs. We have applied MAYDAY to ArduPilot, a popular open-source RAV control program that runs on a wide range of commodity RAVs. Our investigation of 10 RAV accidents caused by real ArduPilot bugs demonstrates that MAYDAY is able to pinpoint the root causes of these accidents within the program with high accuracy and minimum runtime and storage overhead. We also found 4 recently patched bugs still vulnerable and alerted the ArduPilot team.
related project
Robotic vehicles (also known as drones) are facing various threats of cyber-physical attacks that exploit their security vulnerabilities. RetroV develops automated analysis tools to find such vulnerabilities in existing robotic vehicle systems and retrofit their design against advanced cyber-physical attacks.