Fuzzing drones for anomaly detection: A systematic literature review

被引:0
|
作者
Malviya, Vikas K. [1 ]
Minn, Wei [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore, Singapore
关键词
Drone; Fuzzing; Anomaly detection; MAVLink protocol; VEHICLES;
D O I
10.1016/j.cose.2024.104157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological advancements which provide easy control of UAVs via mobile apps. However, UAVs may contain vulnerabilities or software bugs that cause serious safety and security concerns. For example, the communication protocol used by the UAV may contain authentication and authorization vulnerabilities, which maybe exploited by attackers to gain remote access over the UAV. Drones must therefore undergo extensive testing before being released or deployed to identify and fix any software bugs or security vulnerabilities. Fuzzing is one commonly used technique for finding bugs and vulnerabilities in software programs and protocols. This article reviews various approaches where fuzzing is applied to detect bugs and vulnerabilities in UAVs. Our goal is to assess the current state-of-the-art fuzzing approaches for UAVs, which are yet to be explored in the literature. We identified open challenges that call for further research to improve the current state-of-the-art.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Solutions for Monitoring and Anomaly Detection in Dynamic IT Infrastructure: Literature Review
    Grabis, Janis
    Kampars, Janis
    Pinka, Krisjanis
    Mosans, Guntis
    Matisons, Ralfs
    Vindbergs, Artjoms
    CLOSER: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2021, : 224 - 231
  • [32] Anomaly detection based on Artificial Intelligence of Things: A Systematic Literature Mapping
    Trilles, Sergio
    Hammad, Sahibzada Saadoon
    Iskandaryan, Ditsuhi
    INTERNET OF THINGS, 2024, 25
  • [33] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Jonghyeon Ko
    Marco Comuzzi
    Business & Information Systems Engineering, 2023, 65 : 441 - 462
  • [34] Anomaly Detection for Cyber Internet of Things Attacks: A Systematic Review
    Sana, Laraib
    Nazir, Muhammad Mohsin
    Iqbal, Muddesar
    Hussain, Lal
    Ali, Amjad
    APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [35] Enhancing resilience in complex energy systems through real-time anomaly detection: a systematic literature review
    Ali Aghazadeh Ardebili
    Oussama Hasidi
    Ahmed Bendaouia
    Adem Khalil
    Sabri Khalil
    Dalila Luceri
    Antonella Longo
    El Hassan Abdelwahed
    Sara Qassimi
    Antonio Ficarella
    Energy Informatics, 7 (1)
  • [36] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Ko, Jonghyeon
    Comuzzi, Marco
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (04) : 441 - 462
  • [37] ADFuzz: Using Anomaly Detection to Filter Rare Paths for Efficient Fuzzing
    Li H.
    Fang H.
    Qu Y.
    Guo F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (08): : 1912 - 1924
  • [38] Systematic Review of Anomaly Detection in Hyperspectral Remote Sensing Applications
    Racetin, Ivan
    Krtalic, Andrija
    APPLIED SCIENCES-BASEL, 2021, 11 (11):
  • [39] Market manipulation detection: A systematic literature review
    Khodabandehlou, Samira
    Golpayegani, Seyyed Alireza Hashemi
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
  • [40] Automatic Sarcasm Detection: Systematic Literature Review
    Baroiu, Alexandru-Costin
    Trausan-Matu, Stefan
    INFORMATION, 2022, 13 (08)