Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, a research from the University of British Columbia suggests.
Attack overview
Hacking robotic vehicles
The researchers designed three types of stealth attack on robotic vehicles that caused the machines to crash, miss their targets or complete their missions much later than scheduled.
The attacks required little to no human intervention to succeed on both real and simulated drones and rovers.
“We saw major weaknesses in robotic vehicle software that could allow attackers to easily disrupt the behavior of many different kinds of these machines,” said Karthik Pattabiraman, the electrical and computer engineering professor who supervised the study.
“Especially worrisome is the fact that none of these attacks could be detected by the most commonly used detection techniques,” Pattabiraman added.
Deviations attackers can exploit
Robotic vehicles use special algorithms to stay on track while in motion, as well as to flag unusual behavior that could signal an attack. But some degree of deviation from the travel plan is typically allowed to account for external factors like friction and wind – and it’s these deviations that attackers can exploit to throw the vehicles off course.
The team developed an automated process that enables an attacker to quickly learn the allowed deviations of robotic vehicles running conventional protection systems. Hackers can then use the information to launch a series of automated attacks that the vehicle cannot detect until it’s too late.
“Robotic vehicles are already playing an important role in surveillance, warehouse management and other contexts, and their use will only become more widespread in the future,” says Pritam Dash, an electrical and computer engineering graduate student at UBC and the study’s lead author.
“We need safety measures to prevent rogue drones and rovers from causing serious economic, property and even bodily harm,” Dash concluded.
The researchers offer the basis for a few such countermeasures – including self-adjusting deviation thresholds – in a recent paper describing their findings.
from Help Net Security https://ift.tt/2RdmH63
0 comments:
Post a Comment