A survey on cybersecurity attacks and defenses for unmanned aerial systems

Z Wang, Y Li, S Wu, Y Zhou, L Yang, Y Xu… - Journal of Systems …, 2023 - Elsevier
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …

The living review on automated program repair

M Monperrus - 2018 - hal.science
Concept This paper is a living review on automatic program repair 1. Compared to a
traditional survey, a living review evolves over time. I use a concise bullet-list style meant to …

Ec: Embedded systems compartmentalization via intra-kernel isolation

A Khan, D Xu, DJ Tian - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Embedded systems comprise of low-power microcontrollers and constitute computing
systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint …

{PatchVerif}: Discovering Faulty Patches in Robotic Vehicles

H Kim, MO Ozmen, ZB Celik, A Bianchi… - 32nd USENIX Security …, 2023 - usenix.org
Modern software is continuously patched to fix bugs and security vulnerabilities. Patching is
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …

Low-cost privilege separation with compile time compartmentalization for embedded systems

A Khan, D Xu, DJ Tian - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Embedded systems are pervasive and find various applications all around us. These
systems run on low-power microcontrollers with real-time constraints. Developers often …

Get your cyber-physical tests done! data-driven vulnerability assessment of robotic aerial vehicles

A Ding, M Chan, A Hass… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …

SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring

S Park, Y Kim, DH Lee - … of the 26th International Symposium on …, 2023 - dl.acm.org
There are many various data-oriented attacks on robotic vehicles (RVs) that change the
inputs of an RV control program. While much research has been dedicated to detecting the …

Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent

R Han, S Xu, J Li, E Bertino, D Lo, JF Ma… - ACM Transactions on …, 2024 - dl.acm.org
Configurations are supported by most flight control systems, allowing users to control a flying
drone adapted to complexities such as environmental changes or mission alterations. Such …

RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots

U Kaur, ZB Celik, RM Voyles - 2024 IEEE/RSJ International …, 2024 - ieeexplore.ieee.org
Zero-day vulnerabilities pose a significant challenge to robot cyber-physical systems (CPS).
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …

Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles

C Lemieux-Mack, K Leach… - 2024 ACM/IEEE 15th …, 2024 - ieeexplore.ieee.org
As our reliance on micro autonomous vehicles increases, security vulnerabilities and
software defects threaten the successful completion of tasks and missions. Recent work has …