Abstract
With the widespread application of Unmanned Aerial Vehicle (UAV) technology, its security issues have also attracted much attention, among which the configuration attack against the UAV flight control system is one of the current research hotspots. Attackers always upload seemingly normal configuration combinations and cause an imbalance in the UAV state by exploiting configuration item verification vulnerabilities. This paper accumulates flight data through simulation, generates configuration combinations within the security range using differential evolution-based fuzz testing, uses neural networks to guide configuration item variants, and applies these configuration combinations to the AutoTest of UAV flight control systems. The experimental results show that the configuration combinations generated by fuzz testing can guide the UAV to course deviation, spin, crash and other unstable states; the code coverage and function coverage of the position and attitude code library base in the flight control system have also reached a high level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
American Fuzzy Lop. https://lcamtuf.coredump.cx/afl/. Accessed 16 Dec 2022
Kim, T., et al.: RVFuzzer: finding input validation bugs in robotic vehicles through control-guided testing. In: 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, pp. 425–442 (2019)
Han, R., et al.: Control parameters considered harmful: detecting range specification bugs in drone configuration modules via learning-guided search. In: 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE), Pittsburgh, PA, USA, pp. 462–473 (2022)
Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Black Hat Europe 11, 995 (2015)
Fu, Z., Zhi, Y., Ji, S., Sun, X.: Remote attacks on drones vision sensors: an empirical study. IEEE Trans. Depend. Secure Comput. 19, 3125–3135 (2022)
Yunmok, S., et al.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Proceedings of the 24th USENIX Conference on Security Symposium, pp. 881–896 (2015)
Zou, Q., Huang, S., Lin, F., Cong, M.: Detection of GPS spoofing based on UAV model estimation. In: IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, pp. 6097–6102 (2016)
Bethi, P., Pathipati, S., Aparna, P.: Stealthy GPS spoofing: spoofer systems, spoofing techniques and strategies. In: 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, pp. 1–7 (2020)
Young-Min, K., Jaemin, Y., Byeong-Moon, C., Yongsoon, E., Kyung-Joon, P.: Empirical analysis of MAVLink protocol vulnerability for attacking unmanned aerial vehicles. IEEE Access 6, 43203–43212 (2018)
Honggfuzz. https://honggfuzz.dev/. Accessed 5 Jan 2023
The LLVM Compiler Infrastructure. https://llvm.org/. Accessed 10 Jan 2023
Kim, H., Ozmen, M.O., Bianchi, A., Celik, Z.B., Xu, D.: PGFUZZ: policy-guided fuzzing for robotic vehicles. In: NDSS (2021)
She, D., Pei, K., Epstein, D., Yang, J., Ray, B., Jana, S.: NEUZZ: efficient fuzzing with neural program smoothing. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 803–817 (2019)
Nichols, N., Raugas, M., Jasper, R.J., Hilliard, N.: Faster fuzzing: reinitialization with deep neural models. arXiv, abs/1711.02807 (2017)
Lv, C., et al.: SmartSeed: smart seed generation for efficient fuzzing. arXiv, abs/1807.02606 (2018)
Complete Parameter List. https://ardupilot.org/copter/docs/parameters-Copter-stable-V4.3.7.html. Accessed 16 June 2023
AVC 2013. https://avc.sparkfun.com/2013. Accessed 16 June 2023
Storn, R., Price, K.: Differential evolution: a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11(4), 341–359 (1997)
Geatpy: The genetic and evolutionary algorithm toolbox with high performance in python. http://www.geatpy.com/. Accessed 2 Mar 2023
Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)
Luong, T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Lisbon, Portugal, pp. 1412—1421 (2015)
ArduPilot LCOV - code coverage report. https://firmware.ardupilot.org/coverage/. Accessed 16 June 2023
Acknowledgment
This study was supported by the National Key Research and Development Program of China (2020YFB1005704).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ma, Y., Yu, X., Li, Y., Zhang, L., Yan, Y., Tan, Ya. (2024). Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-60037-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-60036-4
Online ISBN: 978-3-031-60037-1
eBook Packages: Computer ScienceComputer Science (R0)