Fuzzing drones for anomaly detection: A systematic literature review

被引:0
|
作者
Malviya, Vikas K. [1 ]
Minn, Wei [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
关键词
Drone; Fuzzing; Anomaly detection; MAVLink protocol; VEHICLES;
D O I
10.1016/j.cose.2024.104157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological advancements which provide easy control of UAVs via mobile apps. However, UAVs may contain vulnerabilities or software bugs that cause serious safety and security concerns. For example, the communication protocol used by the UAV may contain authentication and authorization vulnerabilities, which maybe exploited by attackers to gain remote access over the UAV. Drones must therefore undergo extensive testing before being released or deployed to identify and fix any software bugs or security vulnerabilities. Fuzzing is one commonly used technique for finding bugs and vulnerabilities in software programs and protocols. This article reviews various approaches where fuzzing is applied to detect bugs and vulnerabilities in UAVs. Our goal is to assess the current state-of-the-art fuzzing approaches for UAVs, which are yet to be explored in the literature. We identified open challenges that call for further research to improve the current state-of-the-art.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles
    Solaas, John Roar Ventura
    Mariconti, Enrico
    Tuptuk, Nilufer
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 43 - 58
  • [2] Drones in vegetable crops: A systematic literature review
    Canicatti, Marco
    Vallone, Mariangela
    SMART AGRICULTURAL TECHNOLOGY, 2024, 7
  • [3] A systematic literature review of IoT time series anomaly detection solutions
    Sgueglia, Arnaldo
    Di Sorbo, Andrea
    Visaggio, Corrado Aaron
    Canfora, Gerardo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 134 : 170 - 186
  • [4] Applications of Generative Adversarial Networks in Anomaly Detection: A Systematic Literature Review
    Sabuhi, Mikael
    Zhou, Ming
    Bezemer, Cor-Paul
    Musilek, Petr
    IEEE ACCESS, 2021, 9 : 161003 - 161029
  • [5] Fraud detection: A systematic literature review of graph-based anomaly detection approaches
    Pourhabibi, Tahereh
    Ong, Kok-Leong
    Kam, Booi H.
    Boo, Yee Ling
    DECISION SUPPORT SYSTEMS, 2020, 133
  • [6] Cybersecurity Testing in Drones Domain: A Systematic Literature Review
    Marchetti, Eda
    Waheed, Tauheed
    Calabro, Antonello
    IEEE ACCESS, 2024, 12 : 171166 - 171184
  • [7] A systematic review of fuzzing
    Xiaoqi Zhao
    Haipeng Qu
    Jianliang Xu
    Xiaohui Li
    Wenjie Lv
    Gai-Ge Wang
    Soft Computing, 2024, 28 : 5493 - 5522
  • [8] A systematic review of fuzzing
    Zhao, Xiaoqi
    Qu, Haipeng
    Xu, Jianliang
    Li, Xiaohui
    Lv, Wenjie
    Wang, Gai-Ge
    SOFT COMPUTING, 2024, 28 (06) : 5493 - 5522
  • [9] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
    Araya, Juan Ignacio Iturbe
    Rifa-Pous, Helena
    INTERNET OF THINGS, 2023, 22
  • [10] Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review
    Fahim, Muhammad
    Sillitti, Alberto
    IEEE ACCESS, 2019, 7 : 81664 - 81681