Skip to main content

Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm

  • Conference paper
  • First Online:
Blockchain Technology and Emerging Applications (BlockTEA 2023)

Abstract

With the widespread application of Unmanned Aerial Vehicle (UAV) technology, its security issues have also attracted much attention, among which the configuration attack against the UAV flight control system is one of the current research hotspots. Attackers always upload seemingly normal configuration combinations and cause an imbalance in the UAV state by exploiting configuration item verification vulnerabilities. This paper accumulates flight data through simulation, generates configuration combinations within the security range using differential evolution-based fuzz testing, uses neural networks to guide configuration item variants, and applies these configuration combinations to the AutoTest of UAV flight control systems. The experimental results show that the configuration combinations generated by fuzz testing can guide the UAV to course deviation, spin, crash and other unstable states; the code coverage and function coverage of the position and attitude code library base in the flight control system have also reached a high level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. American Fuzzy Lop. https://lcamtuf.coredump.cx/afl/. Accessed 16 Dec 2022

  2. Kim, T., et al.: RVFuzzer: finding input validation bugs in robotic vehicles through control-guided testing. In: 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, pp. 425–442 (2019)

    Google Scholar 

  3. Han, R., et al.: Control parameters considered harmful: detecting range specification bugs in drone configuration modules via learning-guided search. In: 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE), Pittsburgh, PA, USA, pp. 462–473 (2022)

    Google Scholar 

  4. Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Black Hat Europe 11, 995 (2015)

    Google Scholar 

  5. Fu, Z., Zhi, Y., Ji, S., Sun, X.: Remote attacks on drones vision sensors: an empirical study. IEEE Trans. Depend. Secure Comput. 19, 3125–3135 (2022)

    Article  Google Scholar 

  6. Yunmok, S., et al.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Proceedings of the 24th USENIX Conference on Security Symposium, pp. 881–896 (2015)

    Google Scholar 

  7. Zou, Q., Huang, S., Lin, F., Cong, M.: Detection of GPS spoofing based on UAV model estimation. In: IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, pp. 6097–6102 (2016)

    Google Scholar 

  8. Bethi, P., Pathipati, S., Aparna, P.: Stealthy GPS spoofing: spoofer systems, spoofing techniques and strategies. In: 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, pp. 1–7 (2020)

    Google Scholar 

  9. Young-Min, K., Jaemin, Y., Byeong-Moon, C., Yongsoon, E., Kyung-Joon, P.: Empirical analysis of MAVLink protocol vulnerability for attacking unmanned aerial vehicles. IEEE Access 6, 43203–43212 (2018)

    Article  Google Scholar 

  10. Honggfuzz. https://honggfuzz.dev/. Accessed 5 Jan 2023

  11. The LLVM Compiler Infrastructure. https://llvm.org/. Accessed 10 Jan 2023

  12. Kim, H., Ozmen, M.O., Bianchi, A., Celik, Z.B., Xu, D.: PGFUZZ: policy-guided fuzzing for robotic vehicles. In: NDSS (2021)

    Google Scholar 

  13. She, D., Pei, K., Epstein, D., Yang, J., Ray, B., Jana, S.: NEUZZ: efficient fuzzing with neural program smoothing. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 803–817 (2019)

    Google Scholar 

  14. Nichols, N., Raugas, M., Jasper, R.J., Hilliard, N.: Faster fuzzing: reinitialization with deep neural models. arXiv, abs/1711.02807 (2017)

    Google Scholar 

  15. Lv, C., et al.: SmartSeed: smart seed generation for efficient fuzzing. arXiv, abs/1807.02606 (2018)

    Google Scholar 

  16. Complete Parameter List. https://ardupilot.org/copter/docs/parameters-Copter-stable-V4.3.7.html. Accessed 16 June 2023

  17. AVC 2013. https://avc.sparkfun.com/2013. Accessed 16 June 2023

  18. Storn, R., Price, K.: Differential evolution: a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11(4), 341–359 (1997)

    Article  MathSciNet  Google Scholar 

  19. Geatpy: The genetic and evolutionary algorithm toolbox with high performance in python. http://www.geatpy.com/. Accessed 2 Mar 2023

  20. Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)

  21. Luong, T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Lisbon, Portugal, pp. 1412—1421 (2015)

    Google Scholar 

  22. ArduPilot LCOV - code coverage report. https://firmware.ardupilot.org/coverage/. Accessed 16 June 2023

Download references

Acknowledgment

This study was supported by the National Key Research and Development Program of China (2020YFB1005704).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Y., Yu, X., Li, Y., Zhang, L., Yan, Y., Tan, Ya. (2024). Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-60037-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-60036-4

  • Online ISBN: 978-3-031-60037-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics