Web Analytics
S3 Lab - Software & Systems Security Laboratory The University of Texas at Dallas

Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles

Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, and Chung Hwan Kim

29th ACM Conference on Computer and Communications Security (CCS) 2022.

DOI: 10.1145/3548606.3563551

areas
Security, Cyber-Physical Systems, Software Testing

abstract

Robotic vehicles are playing an increasingly important role in our daily life. Unfortunately, attackers have demonstrated various sensor spoofing attacks that interfere with robotic vehicle operations, imposing serious threats. Thus, it is crucial to discover such at- tacks earlier than attackers so that developers can secure the vehicles. In this paper, we propose a new sensor fuzzing framework SensorFuzz that can systematically discover potential sensor spoof- ing attacks on robotic vehicles. It generates malicious sensor inputs by formally modeling the existing sensor attacks and leveraging high-fidelity vehicle simulation, and then analyzes the impact of the inputs on the vehicle with a resilience-based feedback mechanism.

related project

RetroV RetroV

Robotic vehicles (also known as drones) are facing various threats of cyber-physical attacks that exploit their security vulnerabilities. RetroV develops automated analysis tools to find such vulnerabilities in existing robotic vehicle systems and retrofit their design against advanced cyber-physical attacks.