Skip to content

Latest commit

 

History

History
59 lines (40 loc) · 3.61 KB

related-work.md

File metadata and controls

59 lines (40 loc) · 3.61 KB

Previous studies

Table of Contents


1. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing

1.1. Summary

As the RV (robot vehicle) models become more diverse, the parameters that need to be tested have become very numerous and increasingly difficult to proceed with fuzzing. Over time, fuzzers satisfying these parameters appeared, but it was difficult to apply them directly to the RV system because it was difficult to determine whether the input via the fuzzer caused a malfunction. Thus, in this paper, the RVF detector, which detects the controllable status of the robot, was implemented so that it could easily be determined for malfunction and easily combined with the existing RV simulation framework, thus eliciting vulnerabilities.

2. Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocol

2.1. Summary

It is a paper that has built a direct fuzzer on Mavlink. It is a paper that explains what you have experienced while making fuzzers, starting with structural analysis, fuzzing methodology, mutation method, and CRC calculation. Through this fuzzer, the author discovered a vulnerability and left it as future works to improve the fuzzer.

3. How to Analyze the Cyber Threat from Drones

3.1. Summary

This report investigates the impact of UAS cybersecurity threats from the perspective of DHS (Department of Homeland Security). It focuses primarily on classifying UAS threats in relation to cybersecurity and presents approaches that can help analyze these threats to direct efforts in mitigation and defense strategies.

In this report, a total of four scenarios are presented by dividing the view of UAS as an attack target and the view of UAS as an attack means.

Furthermore, it is concluded by suggesting that senior DHS officials should continue to work harder to establish a safer UAS system.


Table of Contents

Introduction

  1. Research background and goal
  2. Previous studies

Methodology

  1. UAV software
    1. Flight controller software
    2. MAVROS
  2. Ground Control System software
    1. Introduction
    2. Analyze Environment
    3. Vulneralility Analysis Methodology
  3. Hardware
    1. GPS Module
    2. PX4 Optical Flow
    3. PX4 Telemetry Radio
    4. Wifi Module

Result

  1. Project results