ABSTRACT
The safe operation of robotic aerial vehicles (RAV) requires effective security protection of their controllers against cyber-physical attacks. The frequency and sophistication of past attacks against such embedded platforms highlight the need for better defense mechanisms. Existing estimation-based control monitors have tradeoffs, with lightweight linear state estimators lacking sufficient coverage, and heavier data-driven learned models facing implementation and accuracy issues on a constrained real-time RAV. We present Mini-Me, a data-driven online monitoring framework that models the program-level control state dynamics to detect runtime data-oriented attacks against RAVs. Mini-Me leverages the internal dataflow information and control variable dependencies of RAV controller functions to train a neural network-based approximate model as the lightweight replica of the original controller programs. Mini-Me runs the minimal approximate model and detects malicious control state deviation by comparing the estimated outputs with those outputs calculated by the original controller program. We demonstrate Mini-Me on a widely adopted RAV physical model as well as popular RAV virtual models based on open-source firmware, ArduPilot and PX4, and show its effectiveness in detecting five types of attack cases with an average 0.34% space overhead and 2.6% runtime overhead.
- 2014. Gazebo: Open Source Robotics Foundation. http://gazebosim.org/.Google Scholar
- 2020. 3rd Eye Scene. https://github.com/csiro-robotics/3rdEyeScene.Google Scholar
- 2020. Optuna: A hyperparameter optimization framework. https://github.com/optuna/optuna.Google Scholar
- 2020. RetDec: a retargetable machine-code decompiler based on LLVM. https://retdec.com/.Google Scholar
- 2020. SITL Simulator (Software in the Loop). https://ardupilot.org/dev/docs/sitl-simulator-software-in-the-loop.html.Google Scholar
- 2021. Black Magic Probe. https://github.com/blacksphere/blackmagic/wiki.Google Scholar
- 2021. LLVM Alias Analysis Infrastructure. https://llvm.org/docs/AliasAnalysis.html.Google Scholar
- 2021. LLVM Pass Framework. https://llvm.org/docs/WritingAnLLVMPass.html.Google Scholar
- 2021. PX4 Pro Open Source Autopilot - Open Source for Drones. http://px4.io.Google Scholar
- Retrieved July 1, 2020. DHL parcelcopter launches initial operations for research purposes. https://www.dhl.com/en/press/releases/releases_2014/group/dhl_parcelcopter_launches_initial_operations_for_research_purposes.html.Google Scholar
- Retrieved July, 2020. ArduPilot: versatile, Trusted, Open Autopilot software for drones and other autonomous systems. https://ardupilot.org/about.Google Scholar
- Retrieved September 1, 2020. The Crazyflie 2.0, a lightweight, open source flying development platform. https://www.bitcraze.io/products/old-products/crazyflie-2-0/.Google Scholar
- Retrieved September 1, 2020. Valgrind: the instrumentation framework for building dynamic analysis tools. https://valgrind.org/.Google Scholar
- Alireza Abbaspour, Kang K Yen, Shirin Noei, and Arman Sargolzaei. 2016. Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95 (2016), 193–200.Google Scholar
- Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS.Google Scholar
- Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, and Saman Zonouz. 2020. Control behavior integrity for distributed cyber-physical systems. In 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 30–40.Google ScholarCross Ref
- Naif Saleh Almakhdhub, Abraham A Clements, Saurabh Bagchi, and Mathias Payer. 2020. μRAI: Securing embedded systems with return address integrity. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26.Google Scholar
- Amazon. Retrieved July 1, 2020. First Prime Air Delievery. https://www.amazon.com/Amazon-Prime-Air/b?node=8037720011.Google Scholar
- Domagoj Babic and Alan J Hu. 2008. Calysto: scalable and precise extended static checking. In Proceedings of the 30th international conference on Software engineering. 211–220.Google ScholarDigital Library
- Yoshua Bengio, Patrice Simard, and Paolo Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE transactions on neural networks 5, 2 (1994), 157–166.Google ScholarDigital Library
- Rakesh B Bobba, Katherine M Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt, and Thomas J Overbye. 2010. Detecting false data injection attacks on dc state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol. 2010.Google Scholar
- Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.. In USENIX Security Symposium. 161–176.Google Scholar
- Mou Chen, Peng Shi, and Cheng-Chew Lim. 2015. Adaptive neural fault-tolerant control of a 3-DOF model helicopter system. IEEE Transactions on Systems, Man, and Cybernetics: Systems 46, 2(2015), 260–270.Google ScholarCross Ref
- Yuqi Chen, Christopher M Poskitt, and Jun Sun. 2018. Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 648–660.Google ScholarCross Ref
- Long Cheng, Ke Tian, and Danfeng Yao. 2017. Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference. 315–326.Google ScholarDigital Library
- Steven Cheung, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA security scientific symposium, Vol. 46. Citeseer, 1–12.Google Scholar
- Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Xinyan. 2018. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 801–816.Google ScholarDigital Library
- Abraham A Clements, Naif Saleh Almakhdhub, Khaled S Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. 2017. Protecting Bare-metal Embedded Systems With Privilege Overlays. In Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 289–303.Google ScholarCross Ref
- Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman. 2019. Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. In Proceedings of the 35th Annual Computer Security Applications Conference. 660–672.Google ScholarDigital Library
- Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin. 2015. HAFIX: Hardware-assisted flow integrity extension. In Proceedings of the 52nd Annual Design Automation Conference. ACM, 74.Google ScholarDigital Library
- Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT.Google Scholar
- Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. 2017. Just-in-time static analysis. In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307–317.Google Scholar
- Jeffrey L Elman. 1990. Finding structure in time. Cognitive science 14, 2 (1990), 179–211.Google Scholar
- Hadi Esmaeilzadeh, Adrian Sampson, Luis Ceze, and Doug Burger. 2012. Neural acceleration for general-purpose approximate programs. In Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture. IEEE Computer Society, 449–460.Google ScholarDigital Library
- Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine Davis, and Saman Zonouz. 2018. Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. In Proceedings of the 34th Annual Computer Security Applications Conference. ACM, 553–565.Google ScholarDigital Library
- Sriharsha Etigowni, Dave Jing Tian, Grant Hernandez, Saman Zonouz, and Kevin Butler. 2016. CPAC: securing critical infrastructure with cyber-physical access control. In Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 139–152.Google ScholarDigital Library
- Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. 2018. Cross-layer retrofitting of UAVs against cyber-physical attacks. In 2018 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 550–557.Google ScholarDigital Library
- Luis Garcia, Ferdinand Brasser, Mehmet H Cintuglu, Ahmad-Reza Sadeghi, Osama Mohammed, and Saman A Zonouz. 2017. Hey, my malware knows physics! attacking plcs with physical model aware rootkit. In Proceedings of the Network & Distributed System Security Symposium, San Diego, CA, USA. 26–28.Google ScholarCross Ref
- Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).Google Scholar
- Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly detection in cyber physical systems using recurrent neural networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 140–145.Google ScholarCross Ref
- Jared Green. Retrieved July 15, 2020. Drones Will Elevate Urban Design. https://www.smartcitiesdive.com/ex/sustainablecitiescollective/drones-will-elevate-urban-design/1053491/.Google Scholar
- Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, and Xinyu Xing. 2018. Lemna: Explaining deep learning based security applications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 364–379.Google ScholarDigital Library
- Todd E Humphreys, Brent M Ledvina, Mark L Psiaki, Brady W O’Hanlon, and Paul M Kintner. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings.Google Scholar
- Khurum Nazir Junejo and Jonathan Goh. 2016. Behaviour-based attack detection and classification in cyber physical systems using machine learning. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM, 34–43.Google ScholarDigital Library
- Anastasis Keliris and Michail Maniatakos. 2018. Icsref: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478(2018).Google Scholar
- Andrew J Kerns, Daniel P Shepard, Jahshan A Bhatti, and Todd E Humphreys. 2014. Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics 31, 4 (2014), 617–636.Google ScholarDigital Library
- Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, and Dongyan Xu. [n.d.]. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. ([n. d.]).Google Scholar
- Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave Jing Tian, and Dongyan Xu. 2020. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with {MAYDAY}. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 913–930.Google Scholar
- Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu. 2019. RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 425–442.Google Scholar
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).Google Scholar
- Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, and Vijay Varadharajan. 2014. TrustLite: A security architecture for tiny embedded devices. In Proceedings of the Ninth European Conference on Computer Systems. 1–14.Google ScholarDigital Library
- Pang Wei Koh, Thao Nguyen, Yew Siang Tang, Stephen Mussmann, Emma Pierson, Been Kim, and Percy Liang. 2020. Concept bottleneck models. In International Conference on Machine Learning. PMLR, 5338–5348.Google Scholar
- William Landi and Barbara G Ryder. 2004. A safe approximate algorithm for interprocedural pointer aliasing. ACM SIGPLAN Notices 39, 4 (2004), 473–489.Google ScholarDigital Library
- Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9, 3 (2011), 49–51.Google ScholarDigital Library
- Yanlin Li, Jonathan M McCune, and Adrian Perrig. 2011. VIPER: Verifying the integrity of peripherals’ firmware. In Proceedings of the 18th ACM conference on Computer and communications security. 3–16.Google ScholarDigital Library
- Stephen McLaughlin and Saman Zonouz. 2014. Controller-aware false data injection against programmable logic controllers. In Smart Grid Communications (SmartGridComm), 2014 IEEE International Conference on. IEEE, 848–853.Google ScholarCross Ref
- Stephen E McLaughlin, Saman A Zonouz, Devin J Pohly, and Patrick D McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code.. In NDSS, Vol. 14.Google Scholar
- Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479–498.Google Scholar
- Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. {SAVIOR}: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 895–912.Google Scholar
- Ihab Samy, Ian Postlethwaite, and Dawei Gu. 2008. Neural network based sensor validation scheme demonstrated on an unmanned air vehicle (UAV) model. In 2008 47th IEEE Conference on Decision and Control. IEEE, 1237–1242.Google ScholarCross Ref
- Henrik Sandberg, André Teixeira, and Karl H Johansson. 2010. On security indices for state estimators in power networks. In First Workshop on Secure Control Systems (SCS), Stockholm, 2010.Google Scholar
- Hovav Shacham. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security. ACM, 552–561.Google ScholarDigital Library
- Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. 2004. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security. 298–307.Google ScholarDigital Library
- Qikun Shen, Bin Jiang, Peng Shi, and Cheng-Chew Lim. 2014. Novel neural networks-based fault tolerant control scheme with fault alarm. IEEE transactions on cybernetics 44, 11 (2014), 2190–2201.Google ScholarCross Ref
- Qingkai Shi, Xiao Xiao, Rongxin Wu, Jinguo Zhou, Gang Fan, and Charles Zhang. 2018. Pinpoint: Fast and precise sparse value flow analysis for million lines of code. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation. 693–706.Google ScholarDigital Library
- Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 138–157.Google ScholarCross Ref
- Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2013. Non-invasive spoofing attacks for anti-lock braking systems. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 55–72.Google ScholarDigital Library
- Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881–896.Google Scholar
- Pengfei Sun, Luis Garcia, and Saman Zonouz. 2019. Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 349–361.Google ScholarCross Ref
- Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. Sok: Eternal war in memory. In 2013 IEEE Symposium on Security and Privacy. IEEE, 48–62.Google ScholarDigital Library
- HA Talebi and RV Patel. 2006. An intelligent fault detection and recovery scheme for reaction wheel actuator of satellite attitude control systems. In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 3282–3287.Google Scholar
- Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security. ACM, 75–86.Google ScholarDigital Library
- Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, and Peng Ning. 2011. On the expressiveness of return-into-libc attacks. In International Workshop on Recent Advances in Intrusion Detection. Springer, 121–141.Google ScholarDigital Library
- Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 3–18.Google ScholarCross Ref
- Qing Wu and Mehrdad Saif. 2007. Repetitive learning observer based actuator fault detection, isolation, and estimation with application to a satellite attitude control system. In 2007 American Control Conference. IEEE, 414–419.Google ScholarCross Ref
- Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1–12.Google Scholar
- Le Xie, Yilin Mo, and Bruno Sinopoli. 2010. False data injection attacks in electricity markets. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 226–231.Google ScholarCross Ref
- S. Bharadwaj Yadavalli and Aaron Smith. 2019. Raising Binaries to LLVM IR with MCTOLL (WIP Paper). In Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (Phoenix, AZ, USA) (LCTES 2019). Association for Computing Machinery, New York, NY, USA, 213–218. https://doi.org/10.1145/3316482.3326354Google ScholarDigital Library
- Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24, 8 (2016), 109.Google Scholar
- Man-Ki Yoon, Bo Liu, Naira Hovakimyan, and Lui Sha. 2017. Virtualdrone: virtual sensing, actuation, and communication for attack-resilient unmanned aerial systems. In Proceedings of the 8th international conference on cyber-physical systems. 143–154.Google ScholarDigital Library
- Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert J Walls. 2020. Silhouette: Efficient protected shadow stacks for embedded systems. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1219–1236.Google Scholar
- Qi Zhou, Peng Shi, Honghai Liu, and Shengyuan Xu. 2012. Neural-network-based decentralized adaptive output-feedback control for large-scale stochastic nonlinear systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42, 6(2012), 1608–1619.Google ScholarDigital Library
- Saman Zonouz, Katherine M Rogers, Robin Berthier, Rakesh B Bobba, William H Sanders, and Thomas J Overbye. 2012. SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Transactions on Smart Grid 3, 4 (2012), 1790–1799.Google ScholarCross Ref
- Saman Zonouz, Julian Rrushi, and Stephen McLaughlin. 2014. Detecting industrial control malware using automated PLC code analytics. IEEE Security & Privacy 12, 6 (2014), 40–47.Google ScholarCross Ref
- Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing
Recommendations
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityRobotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical systems that operate in the physical world under the control of computing components in the cyber world. Despite RVs' robustness against natural disturbances, cyber ...
A multi-layered and kill-chain based security analysis framework for cyber-physical systems
This paper introduces a novel framework for understanding cyber attacks and the related risks to cyber-physical systems. The framework consists of two elements, a three-layered logical model and reference architecture for cyber-physical systems, and a ...
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks
Structured Query Language injection SQLi attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the security ...
Comments