MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles

被引:17
作者
Habibi, Javid [1 ]
Gupta, Aditi [1 ]
Carlson, Stephen [2 ]
Panicker, Ajay [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, Dept Elect & Comp Engn, W Lafayette, IN 47907 USA
来源
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS | 2015年
关键词
D O I
10.1109/ICDCS.2015.71
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As embedded systems have increased in performance and reliability, their applications have expanded into new domains such as automated drone-based delivery mechanisms. Security of these drones, also referred to as unmanned aerial vehicles (UAVs), is crucial due to their use in many different domains. In this paper, we present a stealthy attack strategy that allows the attacker to change sensor values and modify the UAV navigation path. As the attack is stealthy, the system will continue to execute normally and thus the ground station or other monitoring entities and systems will not be able to detect that an attack is undergoing. With respect to defense, we propose a strategy that combines software and hardware techniques. At software level, we propose a fine grained randomization based approach that modifies the layout of the executable code and hinders code-reuse attack. To strengthen the security of our defense, we leverage a custom hardware platform designed and built by us. The platform isolates the code binary and randomized binary in such a way that the actual code being executed is never exposed for an attacker to analyze. We have implemented a prototype of this defense technique and present results to demonstrate the effectiveness and efficiency of this defense strategy.
引用
收藏
页码:642 / 652
页数:11
相关论文
共 36 条
[1]  
[Anonymous], 2013, ACM SIGSAC S INFORM
[2]  
Bhatkar S, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P105
[3]  
Bhatkar Sandeep., 2005, Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, V14, P17
[4]  
Bletsch T., 2010, TR20108 N CAR STAT U
[5]   Mitigating Code-Reuse Attacks with Control-Flow Locking [J].
Bletsch, Tyler ;
Jiang, Xuxian ;
Freeh, Vince .
27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, :353-362
[6]  
Buchanan E, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P27
[7]  
Checkoway S., 2011, USENIX SEC S, V4, P447
[8]  
Chen P, 2010, LECT NOTES COMPUT SC, V6503, P140, DOI 10.1007/978-3-642-17714-9_11
[9]  
Chen P, 2010, LECT NOTES COMPUT SC, V6476, P340, DOI 10.1007/978-3-642-17650-0_24
[10]  
Chen P, 2009, LECT NOTES COMPUT SC, V5905, P163, DOI 10.1007/978-3-642-10772-6_13