Title :
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles
Author :
Habibi, Javid ; Gupta, Aditi ; Carlsony, Stephen ; Panicker, Ajay ; Bertino, Elisa
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fDate :
June 29 2015-July 2 2015
Abstract :
As embedded systems have increased in performance and reliability, their applications have expanded into new domains such as automated drone-based delivery mechanisms. Security of these drones, also referred to as unmanned aerial vehicles (UAVs), is crucial due to their use in many different domains. In this paper, we present a stealthy attack strategy that allows the attacker to change sensor values and modify the UAV navigation path. As the attack is stealthy, the system will continue to execute normally and thus the ground station or other monitoring entities and systems will not be able to detect that an attack is undergoing. With respect to defense, we propose a strategy that combines software and hardware techniques. At software level, we propose a fine grained randomization based approach that modifies the layout of the executable code and hinders code-reuse attack. To strengthen the security of our defense, we leverage a custom hardware platform designed and built by us. The platform isolates the code binary and randomized binary in such a way that the actual code being executed is never exposed for an attacker to analyze. We have implemented a prototype of this defense technique and present results to demonstrate the effectiveness and efficiency of this defense strategy.
Keywords :
autonomous aerial vehicles; control engineering computing; embedded systems; MAVR; automated drone-based delivery mechanisms; code binary; code reuse stealthy attacks; custom hardware platform; defense technique; embedded systems; fine grained randomization based approach; ground station; randomized binary; sensor values; software techniques; unmanned aerial vehicles; Ash; Computer architecture; Hardware; Microcontrollers; Payloads; Registers; Software;
Conference_Titel :
Distributed Computing Systems (ICDCS), 2015 IEEE 35th International Conference on
Conference_Location :
Columbus, OH
DOI :
10.1109/ICDCS.2015.71