skip to main content
10.1145/3471621.3471869acmotherconferencesArticle/Chapter ViewAbstractPublication PagesraidConference Proceedingsconference-collections
research-article
Public Access

Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing

Published:07 October 2021Publication History

ABSTRACT

The safe operation of robotic aerial vehicles (RAV) requires effective security protection of their controllers against cyber-physical attacks. The frequency and sophistication of past attacks against such embedded platforms highlight the need for better defense mechanisms. Existing estimation-based control monitors have tradeoffs, with lightweight linear state estimators lacking sufficient coverage, and heavier data-driven learned models facing implementation and accuracy issues on a constrained real-time RAV. We present Mini-Me, a data-driven online monitoring framework that models the program-level control state dynamics to detect runtime data-oriented attacks against RAVs. Mini-Me leverages the internal dataflow information and control variable dependencies of RAV controller functions to train a neural network-based approximate model as the lightweight replica of the original controller programs. Mini-Me runs the minimal approximate model and detects malicious control state deviation by comparing the estimated outputs with those outputs calculated by the original controller program. We demonstrate Mini-Me on a widely adopted RAV physical model as well as popular RAV virtual models based on open-source firmware, ArduPilot and PX4, and show its effectiveness in detecting five types of attack cases with an average 0.34% space overhead and 2.6% runtime overhead.

References

  1. 2014. Gazebo: Open Source Robotics Foundation. http://gazebosim.org/.Google ScholarGoogle Scholar
  2. 2020. 3rd Eye Scene. https://github.com/csiro-robotics/3rdEyeScene.Google ScholarGoogle Scholar
  3. 2020. Optuna: A hyperparameter optimization framework. https://github.com/optuna/optuna.Google ScholarGoogle Scholar
  4. 2020. RetDec: a retargetable machine-code decompiler based on LLVM. https://retdec.com/.Google ScholarGoogle Scholar
  5. 2020. SITL Simulator (Software in the Loop). https://ardupilot.org/dev/docs/sitl-simulator-software-in-the-loop.html.Google ScholarGoogle Scholar
  6. 2021. Black Magic Probe. https://github.com/blacksphere/blackmagic/wiki.Google ScholarGoogle Scholar
  7. 2021. LLVM Alias Analysis Infrastructure. https://llvm.org/docs/AliasAnalysis.html.Google ScholarGoogle Scholar
  8. 2021. LLVM Pass Framework. https://llvm.org/docs/WritingAnLLVMPass.html.Google ScholarGoogle Scholar
  9. 2021. PX4 Pro Open Source Autopilot - Open Source for Drones. http://px4.io.Google ScholarGoogle Scholar
  10. Retrieved July 1, 2020. DHL parcelcopter launches initial operations for research purposes. https://www.dhl.com/en/press/releases/releases_2014/group/dhl_parcelcopter_launches_initial_operations_for_research_purposes.html.Google ScholarGoogle Scholar
  11. Retrieved July, 2020. ArduPilot: versatile, Trusted, Open Autopilot software for drones and other autonomous systems. https://ardupilot.org/about.Google ScholarGoogle Scholar
  12. Retrieved September 1, 2020. The Crazyflie 2.0, a lightweight, open source flying development platform. https://www.bitcraze.io/products/old-products/crazyflie-2-0/.Google ScholarGoogle Scholar
  13. Retrieved September 1, 2020. Valgrind: the instrumentation framework for building dynamic analysis tools. https://valgrind.org/.Google ScholarGoogle Scholar
  14. Alireza Abbaspour, Kang K Yen, Shirin Noei, and Arman Sargolzaei. 2016. Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95 (2016), 193–200.Google ScholarGoogle Scholar
  15. Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS.Google ScholarGoogle Scholar
  16. Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, and Saman Zonouz. 2020. Control behavior integrity for distributed cyber-physical systems. In 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 30–40.Google ScholarGoogle ScholarCross RefCross Ref
  17. Naif Saleh Almakhdhub, Abraham A Clements, Saurabh Bagchi, and Mathias Payer. 2020. μRAI: Securing embedded systems with return address integrity. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26.Google ScholarGoogle Scholar
  18. Amazon. Retrieved July 1, 2020. First Prime Air Delievery. https://www.amazon.com/Amazon-Prime-Air/b?node=8037720011.Google ScholarGoogle Scholar
  19. Domagoj Babic and Alan J Hu. 2008. Calysto: scalable and precise extended static checking. In Proceedings of the 30th international conference on Software engineering. 211–220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yoshua Bengio, Patrice Simard, and Paolo Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE transactions on neural networks 5, 2 (1994), 157–166.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rakesh B Bobba, Katherine M Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt, and Thomas J Overbye. 2010. Detecting false data injection attacks on dc state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol. 2010.Google ScholarGoogle Scholar
  22. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.. In USENIX Security Symposium. 161–176.Google ScholarGoogle Scholar
  23. Mou Chen, Peng Shi, and Cheng-Chew Lim. 2015. Adaptive neural fault-tolerant control of a 3-DOF model helicopter system. IEEE Transactions on Systems, Man, and Cybernetics: Systems 46, 2(2015), 260–270.Google ScholarGoogle ScholarCross RefCross Ref
  24. Yuqi Chen, Christopher M Poskitt, and Jun Sun. 2018. Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 648–660.Google ScholarGoogle ScholarCross RefCross Ref
  25. Long Cheng, Ke Tian, and Danfeng Yao. 2017. Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference. 315–326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Steven Cheung, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA security scientific symposium, Vol. 46. Citeseer, 1–12.Google ScholarGoogle Scholar
  27. Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Xinyan. 2018. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 801–816.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Abraham A Clements, Naif Saleh Almakhdhub, Khaled S Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. 2017. Protecting Bare-metal Embedded Systems With Privilege Overlays. In Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 289–303.Google ScholarGoogle ScholarCross RefCross Ref
  29. Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman. 2019. Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. In Proceedings of the 35th Annual Computer Security Applications Conference. 660–672.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin. 2015. HAFIX: Hardware-assisted flow integrity extension. In Proceedings of the 52nd Annual Design Automation Conference. ACM, 74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT.Google ScholarGoogle Scholar
  32. Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. 2017. Just-in-time static analysis. In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307–317.Google ScholarGoogle Scholar
  33. Jeffrey L Elman. 1990. Finding structure in time. Cognitive science 14, 2 (1990), 179–211.Google ScholarGoogle Scholar
  34. Hadi Esmaeilzadeh, Adrian Sampson, Luis Ceze, and Doug Burger. 2012. Neural acceleration for general-purpose approximate programs. In Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture. IEEE Computer Society, 449–460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine Davis, and Saman Zonouz. 2018. Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. In Proceedings of the 34th Annual Computer Security Applications Conference. ACM, 553–565.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sriharsha Etigowni, Dave Jing Tian, Grant Hernandez, Saman Zonouz, and Kevin Butler. 2016. CPAC: securing critical infrastructure with cyber-physical access control. In Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 139–152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. 2018. Cross-layer retrofitting of UAVs against cyber-physical attacks. In 2018 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 550–557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Luis Garcia, Ferdinand Brasser, Mehmet H Cintuglu, Ahmad-Reza Sadeghi, Osama Mohammed, and Saman A Zonouz. 2017. Hey, my malware knows physics! attacking plcs with physical model aware rootkit. In Proceedings of the Network & Distributed System Security Symposium, San Diego, CA, USA. 26–28.Google ScholarGoogle ScholarCross RefCross Ref
  39. Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).Google ScholarGoogle Scholar
  40. Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly detection in cyber physical systems using recurrent neural networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 140–145.Google ScholarGoogle ScholarCross RefCross Ref
  41. Jared Green. Retrieved July 15, 2020. Drones Will Elevate Urban Design. https://www.smartcitiesdive.com/ex/sustainablecitiescollective/drones-will-elevate-urban-design/1053491/.Google ScholarGoogle Scholar
  42. Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, and Xinyu Xing. 2018. Lemna: Explaining deep learning based security applications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 364–379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Todd E Humphreys, Brent M Ledvina, Mark L Psiaki, Brady W O’Hanlon, and Paul M Kintner. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings.Google ScholarGoogle Scholar
  44. Khurum Nazir Junejo and Jonathan Goh. 2016. Behaviour-based attack detection and classification in cyber physical systems using machine learning. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM, 34–43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Anastasis Keliris and Michail Maniatakos. 2018. Icsref: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478(2018).Google ScholarGoogle Scholar
  46. Andrew J Kerns, Daniel P Shepard, Jahshan A Bhatti, and Todd E Humphreys. 2014. Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics 31, 4 (2014), 617–636.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, and Dongyan Xu. [n.d.]. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. ([n. d.]).Google ScholarGoogle Scholar
  48. Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave Jing Tian, and Dongyan Xu. 2020. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with {MAYDAY}. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 913–930.Google ScholarGoogle Scholar
  49. Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu. 2019. RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 425–442.Google ScholarGoogle Scholar
  50. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).Google ScholarGoogle Scholar
  51. Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, and Vijay Varadharajan. 2014. TrustLite: A security architecture for tiny embedded devices. In Proceedings of the Ninth European Conference on Computer Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Pang Wei Koh, Thao Nguyen, Yew Siang Tang, Stephen Mussmann, Emma Pierson, Been Kim, and Percy Liang. 2020. Concept bottleneck models. In International Conference on Machine Learning. PMLR, 5338–5348.Google ScholarGoogle Scholar
  53. William Landi and Barbara G Ryder. 2004. A safe approximate algorithm for interprocedural pointer aliasing. ACM SIGPLAN Notices 39, 4 (2004), 473–489.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9, 3 (2011), 49–51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Yanlin Li, Jonathan M McCune, and Adrian Perrig. 2011. VIPER: Verifying the integrity of peripherals’ firmware. In Proceedings of the 18th ACM conference on Computer and communications security. 3–16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Stephen McLaughlin and Saman Zonouz. 2014. Controller-aware false data injection against programmable logic controllers. In Smart Grid Communications (SmartGridComm), 2014 IEEE International Conference on. IEEE, 848–853.Google ScholarGoogle ScholarCross RefCross Ref
  57. Stephen E McLaughlin, Saman A Zonouz, Devin J Pohly, and Patrick D McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code.. In NDSS, Vol. 14.Google ScholarGoogle Scholar
  58. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479–498.Google ScholarGoogle Scholar
  59. Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. {SAVIOR}: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 895–912.Google ScholarGoogle Scholar
  60. Ihab Samy, Ian Postlethwaite, and Dawei Gu. 2008. Neural network based sensor validation scheme demonstrated on an unmanned air vehicle (UAV) model. In 2008 47th IEEE Conference on Decision and Control. IEEE, 1237–1242.Google ScholarGoogle ScholarCross RefCross Ref
  61. Henrik Sandberg, André Teixeira, and Karl H Johansson. 2010. On security indices for state estimators in power networks. In First Workshop on Secure Control Systems (SCS), Stockholm, 2010.Google ScholarGoogle Scholar
  62. Hovav Shacham. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security. ACM, 552–561.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. 2004. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security. 298–307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Qikun Shen, Bin Jiang, Peng Shi, and Cheng-Chew Lim. 2014. Novel neural networks-based fault tolerant control scheme with fault alarm. IEEE transactions on cybernetics 44, 11 (2014), 2190–2201.Google ScholarGoogle ScholarCross RefCross Ref
  65. Qingkai Shi, Xiao Xiao, Rongxin Wu, Jinguo Zhou, Gang Fan, and Charles Zhang. 2018. Pinpoint: Fast and precise sparse value flow analysis for million lines of code. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation. 693–706.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 138–157.Google ScholarGoogle ScholarCross RefCross Ref
  67. Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2013. Non-invasive spoofing attacks for anti-lock braking systems. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 55–72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881–896.Google ScholarGoogle Scholar
  69. Pengfei Sun, Luis Garcia, and Saman Zonouz. 2019. Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 349–361.Google ScholarGoogle ScholarCross RefCross Ref
  70. Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. Sok: Eternal war in memory. In 2013 IEEE Symposium on Security and Privacy. IEEE, 48–62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. HA Talebi and RV Patel. 2006. An intelligent fault detection and recovery scheme for reaction wheel actuator of satellite attitude control systems. In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 3282–3287.Google ScholarGoogle Scholar
  72. Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security. ACM, 75–86.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, and Peng Ning. 2011. On the expressiveness of return-into-libc attacks. In International Workshop on Recent Advances in Intrusion Detection. Springer, 121–141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 3–18.Google ScholarGoogle ScholarCross RefCross Ref
  75. Qing Wu and Mehrdad Saif. 2007. Repetitive learning observer based actuator fault detection, isolation, and estimation with application to a satellite attitude control system. In 2007 American Control Conference. IEEE, 414–419.Google ScholarGoogle ScholarCross RefCross Ref
  76. Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1–12.Google ScholarGoogle Scholar
  77. Le Xie, Yilin Mo, and Bruno Sinopoli. 2010. False data injection attacks in electricity markets. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 226–231.Google ScholarGoogle ScholarCross RefCross Ref
  78. S. Bharadwaj Yadavalli and Aaron Smith. 2019. Raising Binaries to LLVM IR with MCTOLL (WIP Paper). In Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (Phoenix, AZ, USA) (LCTES 2019). Association for Computing Machinery, New York, NY, USA, 213–218. https://doi.org/10.1145/3316482.3326354Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24, 8 (2016), 109.Google ScholarGoogle Scholar
  80. Man-Ki Yoon, Bo Liu, Naira Hovakimyan, and Lui Sha. 2017. Virtualdrone: virtual sensing, actuation, and communication for attack-resilient unmanned aerial systems. In Proceedings of the 8th international conference on cyber-physical systems. 143–154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert J Walls. 2020. Silhouette: Efficient protected shadow stacks for embedded systems. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1219–1236.Google ScholarGoogle Scholar
  82. Qi Zhou, Peng Shi, Honghai Liu, and Shengyuan Xu. 2012. Neural-network-based decentralized adaptive output-feedback control for large-scale stochastic nonlinear systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42, 6(2012), 1608–1619.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Saman Zonouz, Katherine M Rogers, Robin Berthier, Rakesh B Bobba, William H Sanders, and Thomas J Overbye. 2012. SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Transactions on Smart Grid 3, 4 (2012), 1790–1799.Google ScholarGoogle ScholarCross RefCross Ref
  84. Saman Zonouz, Julian Rrushi, and Stephen McLaughlin. 2014. Detecting industrial control malware using automated PLC code analytics. IEEE Security & Privacy 12, 6 (2014), 40–47.Google ScholarGoogle ScholarCross RefCross Ref
  1. Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses
      October 2021
      468 pages
      ISBN:9781450390583
      DOI:10.1145/3471621

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 October 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format