A survey on cybersecurity attacks and defenses for unmanned aerial systems
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …
civilian fields. However, their open-source software and protocols have made their security …
The living review on automated program repair
M Monperrus - 2018 - hal.science
Concept This paper is a living review on automatic program repair 1. Compared to a
traditional survey, a living review evolves over time. I use a concise bullet-list style meant to …
traditional survey, a living review evolves over time. I use a concise bullet-list style meant to …
Ec: Embedded systems compartmentalization via intra-kernel isolation
Embedded systems comprise of low-power microcontrollers and constitute computing
systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint …
systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint …
{PatchVerif}: Discovering Faulty Patches in Robotic Vehicles
Modern software is continuously patched to fix bugs and security vulnerabilities. Patching is
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …
Low-cost privilege separation with compile time compartmentalization for embedded systems
Embedded systems are pervasive and find various applications all around us. These
systems run on low-power microcontrollers with real-time constraints. Developers often …
systems run on low-power microcontrollers with real-time constraints. Developers often …
Get your cyber-physical tests done! data-driven vulnerability assessment of robotic aerial vehicles
A Ding, M Chan, A Hass… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
There are many various data-oriented attacks on robotic vehicles (RVs) that change the
inputs of an RV control program. While much research has been dedicated to detecting the …
inputs of an RV control program. While much research has been dedicated to detecting the …
Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent
Configurations are supported by most flight control systems, allowing users to control a flying
drone adapted to complexities such as environmental changes or mission alterations. Such …
drone adapted to complexities such as environmental changes or mission alterations. Such …
RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots
Zero-day vulnerabilities pose a significant challenge to robot cyber-physical systems (CPS).
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles
As our reliance on micro autonomous vehicles increases, security vulnerabilities and
software defects threaten the successful completion of tasks and missions. Recent work has …
software defects threaten the successful completion of tasks and missions. Recent work has …