Fuzzing drones for anomaly detection: A systematic literature review

被引:0
|
作者
Malviya, Vikas K. [1 ]
Minn, Wei [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
关键词
Drone; Fuzzing; Anomaly detection; MAVLink protocol; VEHICLES;
D O I
10.1016/j.cose.2024.104157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological advancements which provide easy control of UAVs via mobile apps. However, UAVs may contain vulnerabilities or software bugs that cause serious safety and security concerns. For example, the communication protocol used by the UAV may contain authentication and authorization vulnerabilities, which maybe exploited by attackers to gain remote access over the UAV. Drones must therefore undergo extensive testing before being released or deployed to identify and fix any software bugs or security vulnerabilities. Fuzzing is one commonly used technique for finding bugs and vulnerabilities in software programs and protocols. This article reviews various approaches where fuzzing is applied to detect bugs and vulnerabilities in UAVs. Our goal is to assess the current state-of-the-art fuzzing approaches for UAVs, which are yet to be explored in the literature. We identified open challenges that call for further research to improve the current state-of-the-art.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles
    Solaas, John Roar Ventura
    Mariconti, Enrico
    Tuptuk, Nilufer
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 43 - 58
  • [2] A systematic literature review of IoT time series anomaly detection solutions
    Sgueglia, Arnaldo
    Di Sorbo, Andrea
    Visaggio, Corrado Aaron
    Canfora, Gerardo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 134 : 170 - 186
  • [3] Applications of Generative Adversarial Networks in Anomaly Detection: A Systematic Literature Review
    Sabuhi, Mikael
    Zhou, Ming
    Bezemer, Cor-Paul
    Musilek, Petr
    IEEE ACCESS, 2021, 9 : 161003 - 161029
  • [4] Cybersecurity Testing in Drones Domain: A Systematic Literature Review
    Marchetti, Eda
    Waheed, Tauheed
    Calabro, Antonello
    IEEE ACCESS, 2024, 12 : 171166 - 171184
  • [5] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
    Araya, Juan Ignacio Iturbe
    Rifa-Pous, Helena
    INTERNET OF THINGS, 2023, 22
  • [6] A systematic literature review on the main factors for public acceptance of drones
    Sabino, Hullysses
    Almeida, Rodrigo V. S.
    de Moraes, Lucas Baptista
    da Silva, Walber Paschoal
    Guerra, Raphael
    Malcher, Carlos
    Passos, Diego
    Passos, Fernanda G. O.
    TECHNOLOGY IN SOCIETY, 2022, 71
  • [7] Machine Learning for Anomaly Detection: A Systematic Review
    Nassif, Ali Bou
    Talib, Manar Abu
    Nasir, Qassim
    Dakalbab, Fatima Mohamad
    IEEE ACCESS, 2021, 9 : 78658 - 78700
  • [8] Drones in Emergency Medical Services: A Systematic Literature Review with Bibliometric Analysis
    Pulsiri, Nonthapat
    Vatananan-Thesenvitz, Ronald
    INTERNATIONAL JOURNAL OF INNOVATION AND TECHNOLOGY MANAGEMENT, 2021, 18 (04)
  • [9] State of the Art Literature Review on Network Anomaly Detection
    Bodstrom, Tero
    Hamalainen, Timo
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2018, 2018, 11118 : 89 - 101
  • [10] Cybersecurity Risk Assessment for Medium-Risk Drones: A Systematic Literature Review
    Alexandre, Rui Carlos Josino
    Martins, Luiz Eduardo Galvao
    Gorschek, Tony
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2023, 38 (06) : 28 - 43