{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:56:56Z","timestamp":1770231416177,"version":"3.49.0"},"reference-count":68,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Intel"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>Robotic vehicles (RV) are increasing in adoption in many industrial sectors. RVs use auto-pilot software for perception and navigation and rely on sensors and actuators for operating autonomously in the physical world. Control algorithms have been used in RVs to minimize the effects of noisy sensors, prevent faulty actuator output, and, recently, to detect attacks against RVs. In this article, we demonstrate the vulnerabilities in control-based intrusion detection techniques and propose three kinds of stealthy attacks that evade detection and disrupt RV missions. We also propose automated algorithms for performing the attacks without requiring the attacker to expend significant effort or to know specific details of the RV, thus making the attacks applicable to a wide range of RVs. We demonstrate the attacks on eight RV systems including three real vehicles in the presence of an Intrusion Detection System using control-based techniques to monitor RV\u2019s runtime behavior and detect attacks. We find that the control-based techniques are incapable of detecting our stealthy attacks and that the attacks can have significant adverse impact on the RV\u2019s mission (e.g., deviate it significantly from its target, or cause it to crash).<\/jats:p>","DOI":"10.1145\/3419474","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T11:29:49Z","timestamp":1611314989000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques"],"prefix":"10.1145","volume":"2","author":[{"given":"Pritam","family":"Dash","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Mehdi","family":"Karimibiuki","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Karthik","family":"Pattabiraman","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IFIP International Information Security and Privacy Conference. 91--104","author":"Adepu Sridhar","year":"2016","unstructured":"Sridhar Adepu and Aditya Mathur . 2016 . Using process invariants to detect cyber attacks on a water treatment system . In Proceedings of the IFIP International Information Security and Privacy Conference. 91--104 Sridhar Adepu and Aditya Mathur. 2016. Using process invariants to detect cyber attacks on a water treatment system. In Proceedings of the IFIP International Information Security and Privacy Conference. 91--104"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC\u201918)","author":"Aggarwal Ekta","year":"2018","unstructured":"Ekta Aggarwal , Mehdi Karimibiuki , Karthik Pattabiraman , and Andr\u00e9 Ivanov . 2018 . CORGIDS: A correlation-based generic intrusion detection system . In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC\u201918) . ACM, New York, NY, 24--35. DOI:https:\/\/doi.org\/10.1145\/3264888.3264893 10.1145\/3264888.3264893 Ekta Aggarwal, Mehdi Karimibiuki, Karthik Pattabiraman, and Andr\u00e9 Ivanov. 2018. CORGIDS: A correlation-based generic intrusion detection system. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC\u201918). ACM, New York, NY, 24--35. DOI:https:\/\/doi.org\/10.1145\/3264888.3264893"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC\u201918)","author":"Ahmed Chuadhry Mujeeb","unstructured":"Chuadhry Mujeeb Ahmed , Jianying Zhou , and Aditya P. Mathur . 2018. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS . In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC\u201918) . ACM, New York, NY, 566--581. DOI:https:\/\/doi.org\/10.1145\/3274694.3274748 10.1145\/3274694.3274748 Chuadhry Mujeeb Ahmed, Jianying Zhou, and Aditya P. Mathur. 2018. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC\u201918). ACM, New York, NY, 566--581. DOI:https:\/\/doi.org\/10.1145\/3274694.3274748"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201916)","author":"Alemzadeh H.","year":"2016","unstructured":"H. Alemzadeh , D. Chen , X. Li , T. Kesavadas , Z. T. Kalbarczyk , and R. K. Iyer . 2016. Targeted attacks on teleoperated surgical robots: Dynamic model-based detection and mitigation . In Proceedings of the 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201916) . 395--406. DOI:https:\/\/doi.org\/10.1109\/DSN. 2016 .43 10.1109\/DSN.2016.43 H. Alemzadeh, D. Chen, X. Li, T. Kesavadas, Z. T. Kalbarczyk, and R. K. Iyer. 2016. Targeted attacks on teleoperated surgical robots: Dynamic model-based detection and mitigation. In Proceedings of the 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201916). 395--406. DOI:https:\/\/doi.org\/10.1109\/DSN.2016.43"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106282"},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","author":"Amazon Prime","year":"2019","unstructured":"Amazon Prime [n.d.]. Amazon Prime Delivery . Retrieved January 24, 2019 from https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011. Amazon Prime [n.d.]. Amazon Prime Delivery. Retrieved January 24, 2019 from https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011."},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"ArduPilot","year":"2018","unstructured":"ArduPilot [n.d.]. Ardupilot\u2014Software in the Loop . Retrieved May 24, 2018 from http:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html. ArduPilot [n.d.]. Ardupilot\u2014Software in the Loop. Retrieved May 24, 2018 from http:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html."},{"key":"e_1_2_1_8_1","volume-title":"Retrieved","author":"Baker Aryn","year":"2019","unstructured":"Aryn Baker . [n.d.]. Zipline Drone Delivery . Retrieved January 24, 2019 from http:\/\/www.flyzipline.com\/. Aryn Baker. [n.d.]. Zipline Drone Delivery. Retrieved January 24, 2019 from http:\/\/www.flyzipline.com\/."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2010.02.014"},{"key":"e_1_2_1_10_1","volume-title":"Retrieved","author":"Burns Stephen","year":"2019","unstructured":"Stephen Burns . [n.d.]. Drone Meets Delivery Truck . Retrieved May 24, 2019 from https:\/\/www.ups.com\/us\/es\/services\/knowledge-center\/article.page?name=drone-meets-delivery-truck8kid=cd18bdc2. Stephen Burns. [n.d.]. Drone Meets Delivery Truck. Retrieved May 24, 2019 from https:\/\/www.ups.com\/us\/es\/services\/knowledge-center\/article.page?name=drone-meets-delivery-truck8kid=cd18bdc2."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Workshop on Future Directions in Cyber-physical Systems Security. DHS.","author":"Cardenas Alvaro","year":"2009","unstructured":"Alvaro Cardenas , Saurabh Amin , Bruno Sinopoli , Annarita Giani , Adrian Perrig , and Shankar Sastry . 2009 . Challenges for securing cyber physical systems . In Proceedings of the Workshop on Future Directions in Cyber-physical Systems Security. DHS. Alvaro Cardenas, Saurabh Amin, Bruno Sinopoli, Annarita Giani, Adrian Perrig, and Shankar Sastry. 2009. Challenges for securing cyber physical systems. In Proceedings of the Workshop on Future Directions in Cyber-physical Systems Security. DHS."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_2_1_13_1","volume-title":"Progress in Systems Engineering","author":"Chmaj Grzegorz","unstructured":"Grzegorz Chmaj and Henry Selvaraj . 2015. Distributed processing applications for UAV\/drones: A survey . In Progress in Systems Engineering , Henry Selvaraj, Dawid Zydek, and Grzegorz Chmaj (Eds.). Springer International Publishing , Cham , 449--454. Grzegorz Chmaj and Henry Selvaraj. 2015. Distributed processing applications for UAV\/drones: A survey. In Progress in Systems Engineering, Henry Selvaraj, Dawid Zydek, and Grzegorz Chmaj (Eds.). Springer International Publishing, Cham, 449--454."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920)","author":"Choi Hongjun","year":"2020","unstructured":"Hongjun Choi , Sayali Kate , Yousra Aafer , Xiangyu Zhang , and Dongyan Xu . 2020 . Software-based realtime recovery from sensor attacks on robotic vehicles . In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920) . USENIX Association. Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, and Dongyan Xu. 2020. Software-based realtime recovery from sensor attacks on robotic vehicles. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920). USENIX Association."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 10th ACM\/IEEE international conference on cyber-physical systems (ICCPS\u201919)","author":"Chung Keywhan","unstructured":"Keywhan Chung , Zbigniew T. Kalbarczyk , and Ravishankar K. Iyer . 2019. Availability attacks on computing systems through alteration of environmental control: Smart malware approach . In Proceedings of the 10th ACM\/IEEE international conference on cyber-physical systems (ICCPS\u201919) . ACM, New York, NY, 1--12. DOI:https:\/\/doi.org\/10.1145\/3302509.3311041 10.1145\/3302509.3311041 Keywhan Chung, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. 2019. Availability attacks on computing systems through alteration of environmental control: Smart malware approach. In Proceedings of the 10th ACM\/IEEE international conference on cyber-physical systems (ICCPS\u201919). ACM, New York, NY, 1--12. DOI:https:\/\/doi.org\/10.1145\/3302509.3311041"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201919)","author":"Chung Keywhan","year":"2019","unstructured":"Keywhan Chung , Xiao Li , Peicheng Tang , Zeran Zhu , Zbigniew T. Kalbarczyk , Ravishankar K. Iyer , and Thenkurussi Kesavadas . 2019 . Smart malware that uses leaked control data of robotic applications: The case of Raven-II surgical robots . In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201919) . USENIX Association, 337--351. Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, and Thenkurussi Kesavadas. 2019. Smart malware that uses leaked control data of robotic applications: The case of Raven-II surgical robots. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201919). USENIX Association, 337--351."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 2010 1st IEEE International Conference on Smart Grid Communications. 214--219","author":"Dan G.","year":"2010","unstructured":"G. Dan and H. Sandberg . 2010. Stealth attacks and protection schemes for state estimators in power systems . In Proceedings of the 2010 1st IEEE International Conference on Smart Grid Communications. 214--219 . DOI:https:\/\/doi.org\/10.1109\/SMARTGRID. 2010 .5622046 10.1109\/SMARTGRID.2010.5622046 G. Dan and H. Sandberg. 2010. Stealth attacks and protection schemes for state estimators in power systems. In Proceedings of the 2010 1st IEEE International Conference on Smart Grid Communications. 214--219. DOI:https:\/\/doi.org\/10.1109\/SMARTGRID.2010.5622046"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT\u201916)","author":"Davidson Drew","year":"2016","unstructured":"Drew Davidson , Hao Wu , Rob Jellinek , Vikas Singh , and Thomas Ristenpart . 2016 . Controlling UAVs with sensor input spoofing attacks . In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT\u201916) . USENIX Association. Drew Davidson, Hao Wu, Rob Jellinek, Vikas Singh, and Thomas Ristenpart. 2016. Controlling UAVs with sensor input spoofing attacks. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT\u201916). USENIX Association."},{"key":"e_1_2_1_20_1","unstructured":"Emlid. [n.d.]. Navio2. Retrieved from https:\/\/emlid.com\/navio\/.  Emlid. [n.d.]. Navio2. Retrieved from https:\/\/emlid.com\/navio\/."},{"key":"e_1_2_1_21_1","unstructured":"ETH-Agile and Dexterous Robotics Lab. [n.d.]. Control Toolbox. Retrieved from https:\/\/ethz-adrl.github.io\/ct\/ct_doc\/doc\/html\/index.html.  ETH-Agile and Dexterous Robotics Lab. [n.d.]. Control Toolbox. Retrieved from https:\/\/ethz-adrl.github.io\/ct\/ct_doc\/doc\/html\/index.html."},{"key":"e_1_2_1_22_1","volume-title":"IEEE International Conference on Robotics and Automation (ICRA'20)","author":"Fei Fan","year":"2019","unstructured":"Fan Fei , Zhan Tu , Dongyan Xu , and Xinyan Deng . 2019 . Learn-to-recover: Retrofitting UAVs with reinforcement learning-assisted flight control under cyber-physical attacks . In IEEE International Conference on Robotics and Automation (ICRA'20) . 7358--7364. DOI:10.1109\/ICRA40945.2020.9196611 10.1109\/ICRA40945.2020.9196611 Fan Fei, Zhan Tu, Dongyan Xu, and Xinyan Deng. 2019. Learn-to-recover: Retrofitting UAVs with reinforcement learning-assisted flight control under cyber-physical attacks. In IEEE International Conference on Robotics and Automation (ICRA'20). 7358--7364. DOI:10.1109\/ICRA40945.2020.9196611"},{"key":"e_1_2_1_23_1","volume-title":"Feedback Control of Dynamic Systems","author":"Franklin Gene F.","unstructured":"Gene F. Franklin , J. David Powell , and Abbas Emami-Naeini . 2018. Feedback Control of Dynamic Systems ( 8 th Ed.) (What\u2019s New in Engineering). Pearson . Gene F. Franklin, J. David Powell, and Abbas Emami-Naeini. 2018. Feedback Control of Dynamic Systems (8th Ed.) (What\u2019s New in Engineering). Pearson.","edition":"8"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201917)","author":"Garcia Luis","unstructured":"Luis Garcia , Ferdinand Brasser , Mehmet Hazar Cintuglu , Ahmad-Reza Sadeghi , Osama A. Mohammed , and Saman A. Zonouz . 2017. Hey, my malware knows physics! Attacking PLCs with physical model aware rootkit . In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201917) . Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz. 2017. Hey, my malware knows physics! Attacking PLCs with physical model aware rootkit. In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201917)."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 2nd ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec\u201920)","author":"Ian","unstructured":"Ian Y. Garrett and Ryan M. Gerdes. 2020. On the efficacy of model-based attack detectors for unmanned aerial systems . In Proceedings of the 2nd ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec\u201920) . Association for Computing Machinery, New York, NY, 11--14. Ian Y. Garrett and Ryan M. Gerdes. 2020. On the efficacy of model-based attack detectors for unmanned aerial systems. In Proceedings of the 2nd ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec\u201920). Association for Computing Machinery, New York, NY, 11--14."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC\u201917)","author":"G\u00f3es R. M.","year":"2017","unstructured":"R. M. G\u00f3es , E. Kang , R. Kwong , and S. Lafortune . 2017. Stealthy deception attacks for cyber-physical systems . In Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC\u201917) . 4224--4230. DOI:https:\/\/doi.org\/10.1109\/CDC. 2017 .8264281 10.1109\/CDC.2017.8264281 R. M. G\u00f3es, E. Kang, R. Kwong, and S. Lafortune. 2017. Stealthy deception attacks for cyber-physical systems. In Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC\u201917). 4224--4230. DOI:https:\/\/doi.org\/10.1109\/CDC.2017.8264281"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems. 642--652","author":"Habibi J.","unstructured":"J. Habibi , A. Gupta , S. Carlsony , A. Panicker , and E. Bertino . 2015. MAVR: Code reuse stealthy attacks and mitigation on unmanned aerial vehicles . In Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems. 642--652 . J. Habibi, A. Gupta, S. Carlsony, A. Panicker, and E. Bertino. 2015. MAVR: Code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems. 642--652."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy (SPS\u201908)","author":"Halperin D.","unstructured":"D. Halperin , T. S. Heydt-Benjamin , B. Ransford , S. S. Clark , B. Defend , W. Morgan , K. Fu , T. Kohno , and W. H. Maisel . 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses . In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SPS\u201908) . D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SPS\u201908)."},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"Hawkins Andrew J.","year":"2019","unstructured":"Andrew J. Hawkins . [n.d.]. UPS will use drones to deliver medical supplies in North Carolina . Retrieved May 24, 2019 from https:\/\/www.theverge.com\/2019\/3\/26\/18282291\/ups-drone-delivery-hospital-nc-matternet. Andrew J. Hawkins. [n.d.]. UPS will use drones to deliver medical supplies in North Carolina. Retrieved May 24, 2019 from https:\/\/www.theverge.com\/2019\/3\/26\/18282291\/ups-drone-delivery-hospital-nc-matternet."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Institute of Navigation GNSS (ION GNSS\u201908)","author":"Humphreys Todd E.","year":"2008","unstructured":"Todd E. Humphreys . 2008 . Assessing the spoofing threat: Development of a portable GPS civilian spoofer . In Proceedings of the Institute of Navigation GNSS (ION GNSS\u201908) . Todd E. Humphreys. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the Institute of Navigation GNSS (ION GNSS\u201908)."},{"key":"e_1_2_1_31_1","volume-title":"Retrieved","author":"Sim","year":"2018","unstructured":"JSM Sim [n.d.]. JSBSim Open Source Flight Dynamics Model . Retrieved May 24, 2018 from \u201chttp:\/\/jsbsim.sourceforge.net\/\u201d. JSMSim [n.d.]. JSBSim Open Source Flight Dynamics Model. Retrieved May 24, 2018 from \u201chttp:\/\/jsbsim.sourceforge.net\/\u201d."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 37th Annual Conference of the IEEE Industrial Electronics Society (IECON\u201911)","author":"Karnouskos S.","year":"2011","unstructured":"S. Karnouskos . 2011 . Stuxnet worm impact on industrial cyber-physical system security . In Proceedings of the 37th Annual Conference of the IEEE Industrial Electronics Society (IECON\u201911) . 4490--4494. DOI:https:\/\/doi.org\/10.1109\/IECON.2011.6120048 10.1109\/IECON.2011.6120048 S. Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In Proceedings of the 37th Annual Conference of the IEEE Industrial Electronics Society (IECON\u201911). 4490--4494. DOI:https:\/\/doi.org\/10.1109\/IECON.2011.6120048"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916)","author":"Kim Kyo Hyun","year":"2020","unstructured":"Kyo Hyun Kim , Siddhartha Nalluri , Ashish Kashinath , Yu Wang , Sibin Mohan , Miroslav Pajic , and Bo Li . 2020 . Security analysis against spoofing attacks for distributed UAVs . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916) . Association for Computing Machinery, New York, NY. DOI:https:\/\/doi.org\/10.1145\/2976749.2978388 10.1145\/2976749.2978388 Kyo Hyun Kim, Siddhartha Nalluri, Ashish Kashinath, Yu Wang, Sibin Mohan, Miroslav Pajic, and Bo Li. 2020. Security analysis against spoofing attacks for distributed UAVs. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916). Association for Computing Machinery, New York, NY. DOI:https:\/\/doi.org\/10.1145\/2976749.2978388"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 19)","author":"Kim Taegyu","year":"2019","unstructured":"Taegyu Kim , Chung Hwan Kim , Junghwan Rhee , Fan Fei , Zhan Tu , Gregory Walkup , Xiangyu Zhang , Xinyan Deng , and Dongyan Xu . 2019 . RVFuzzer: Finding input validation bugs in robotic vehicles through control-guided testing . In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, 425--442. Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu. 2019. RVFuzzer: Finding input validation bugs in robotic vehicles through control-guided testing. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 425--442."},{"key":"e_1_2_1_35_1","volume-title":"Analysis of the cyber attack on the ukrainian power grid. Technical report","author":"Lee Robert M.","unstructured":"Robert M. Lee , Michael J. Assante , and Tim Conway . 2016. Analysis of the cyber attack on the ukrainian power grid. Technical report . Electricity Information Sharing and Analysis Center (E-ISAC) . Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the cyber attack on the ukrainian power grid. Technical report. Electricity Information Sharing and Analysis Center (E-ISAC)."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 2011 IEEE International Conference on Mechatronics and Automation. 573--578","author":"Li J.","year":"2011","unstructured":"J. Li and Y. Li . 2011. Dynamic analysis and PID control for a quadrotor . In Proceedings of the 2011 IEEE International Conference on Mechatronics and Automation. 573--578 . DOI:https:\/\/doi.org\/10.1109\/ICMA. 2011 .5985724 10.1109\/ICMA.2011.5985724 J. Li and Y. Li. 2011. Dynamic analysis and PID control for a quadrotor. In Proceedings of the 2011 IEEE International Conference on Mechatronics and Automation. 573--578. DOI:https:\/\/doi.org\/10.1109\/ICMA.2011.5985724"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909)","author":"Liu Yao","unstructured":"Yao Liu , Peng Ning , and Michael K. Reiter . 2009. False data injection attacks against state estimation in electric power grids . In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909) . ACM, New York, NY, 21--32. DOI:https:\/\/doi.org\/10.1145\/1653662.1653666 10.1145\/1653662.1653666 Yao Liu, Peng Ning, and Michael K. Reiter. 2009. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909). ACM, New York, NY, 21--32. DOI:https:\/\/doi.org\/10.1145\/1653662.1653666"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TAC.1979.1101943","article-title":"Asymptotic behavior of the extended Kalman filter as a parameter estimator for linear systems","volume":"24","author":"Ljung L.","year":"1979","unstructured":"L. Ljung . 1979 . Asymptotic behavior of the extended Kalman filter as a parameter estimator for linear systems . IEEE Trans. Automat. Contr. 24 , 1 (Feb. 1979), 36--50. DOI:https:\/\/doi.org\/10.1109\/TAC.1979.1101943 10.1109\/TAC.1979.1101943 L. Ljung. 1979. Asymptotic behavior of the extended Kalman filter as a parameter estimator for linear systems. IEEE Trans. Automat. Contr. 24, 1 (Feb. 1979), 36--50. DOI:https:\/\/doi.org\/10.1109\/TAC.1979.1101943","journal-title":"IEEE Trans. Automat. Contr."},{"key":"e_1_2_1_39_1","first-page":"4","article-title":"Detection of faults and attacks including false data injection attack in smart grid using kalman filter","volume":"1","author":"Manandhar K.","year":"2014","unstructured":"K. Manandhar , X. Cao , F. Hu , and Y. Liu . 2014 . Detection of faults and attacks including false data injection attack in smart grid using kalman filter . IEEE Trans. Contr. Netw. Syst. 1 , 4 (Dec. 2014), 370--379. DOI:https:\/\/doi.org\/10.1109\/TCNS.2014.2357531 10.1109\/TCNS.2014.2357531 K. Manandhar, X. Cao, F. Hu, and Y. Liu. 2014. Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans. Contr. Netw. Syst. 1, 4 (Dec. 2014), 370--379. DOI:https:\/\/doi.org\/10.1109\/TCNS.2014.2357531","journal-title":"IEEE Trans. Contr. Netw. Syst."},{"key":"e_1_2_1_40_1","unstructured":"MATLAB. [n.d.]. System Identification Overview. Retrieved from https:\/\/www.mathworks.com\/help\/ident\/gs\/about-system-identification.html.  MATLAB. [n.d.]. System Identification Overview. Retrieved from https:\/\/www.mathworks.com\/help\/ident\/gs\/about-system-identification.html."},{"key":"e_1_2_1_41_1","unstructured":"MATLAB. [n.d.]. System Identification Toolbox. Retrieved from https:\/\/www.mathworks.com\/products\/sysid.html.  MATLAB. [n.d.]. System Identification Toolbox. Retrieved from https:\/\/www.mathworks.com\/products\/sysid.html."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm\u201914)","author":"McLaughlin S.","year":"2014","unstructured":"S. McLaughlin and S. Zonouz . 2014. Controller-aware false data injection against programmable logic controllers . In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm\u201914) . 848--853. DOI:https:\/\/doi.org\/10.1109\/SmartGridComm. 2014 .7007754 10.1109\/SmartGridComm.2014.7007754 S. McLaughlin and S. Zonouz. 2014. Controller-aware false data injection against programmable logic controllers. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm\u201914). 848--853. DOI:https:\/\/doi.org\/10.1109\/SmartGridComm.2014.7007754"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 2011 IEEE International Conference on Robotics and Automation. IEEE, 2992--2997","author":"Meier Lorenz","year":"2011","unstructured":"Lorenz Meier , Petri Tanskanen , Friedrich Fraundorfer , and Marc Pollefeys . 2011 . Pixhawk: A system for autonomous flight using onboard computer vision . In Proceedings of the 2011 IEEE International Conference on Robotics and Automation. IEEE, 2992--2997 . Lorenz Meier, Petri Tanskanen, Friedrich Fraundorfer, and Marc Pollefeys. 2011. Pixhawk: A system for autonomous flight using onboard computer vision. In Proceedings of the 2011 IEEE International Conference on Robotics and Automation. IEEE, 2992--2997."},{"key":"e_1_2_1_44_1","unstructured":"MARS 2020 Mission. [n.d.]. MARS Exploration Rover. Retrieved from https:\/\/mars.nasa.gov\/mer\/mission\/rover\/.  MARS 2020 Mission. [n.d.]. MARS Exploration Rover. Retrieved from https:\/\/mars.nasa.gov\/mer\/mission\/rover\/."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248326.2248334"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_2_1_47_1","unstructured":"GNU Octave. [n.d.]. GNU Octave Scientific Programming Language. Retrieved from https:\/\/www.gnu.org\/software\/octave\/.  GNU Octave. [n.d.]. GNU Octave Scientific Programming Language. Retrieved from https:\/\/www.gnu.org\/software\/octave\/."},{"key":"e_1_2_1_48_1","unstructured":"Out of Control. [n.d.]. Artificial Delay Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1_CHITopKSraKZXnAIyeUoQZqki8fgUXe.  Out of Control. [n.d.]. Artificial Delay Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1_CHITopKSraKZXnAIyeUoQZqki8fgUXe."},{"key":"e_1_2_1_49_1","unstructured":"Out of Control. [n.d.]. False Data Injection Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1JgrCpwspsBiYdNvKUxeKnl-bZQ9WS_Cg.  Out of Control. [n.d.]. False Data Injection Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1JgrCpwspsBiYdNvKUxeKnl-bZQ9WS_Cg."},{"key":"e_1_2_1_50_1","unstructured":"Out of Control. [n.d.]. Switch Mode Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1yUSGa5GoBQYl0GTiTbcPFN5NnjBHXL-Y.  Out of Control. [n.d.]. Switch Mode Attack Demo Video. Retrieved from https:\/\/drive.google.com\/open?id=1yUSGa5GoBQYl0GTiTbcPFN5NnjBHXL-Y."},{"key":"e_1_2_1_51_1","unstructured":"Parrot.com. [n.d.]. Bebop2. Retrieved from https:\/\/www.parrot.com\/us\/drones\/parrot-bebop-2.  Parrot.com. [n.d.]. Bebop2. Retrieved from https:\/\/www.parrot.com\/us\/drones\/parrot-bebop-2."},{"key":"e_1_2_1_52_1","unstructured":"Gazebo Project. [n.d.]. Gazebo Robot Simulation. Retrieved from http:\/\/gazebosim.org\/.  Gazebo Project. [n.d.]. Gazebo Robot Simulation. Retrieved from http:\/\/gazebosim.org\/."},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . 2020 . SAVIOR: Securing autonomous vehicles with robust physical invariants . In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association. Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing autonomous vehicles with robust physical invariants. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). USENIX Association."},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Hadi Ravanbakhsh Sina Aghli Christoffer Heckman and Sriram Sankaranarayanan. 2018. Path-following through control funnel functions. arXiv\/1804.05288. Retrieved from https:\/\/arxiv:1804.05288.  Hadi Ravanbakhsh Sina Aghli Christoffer Heckman and Sriram Sankaranarayanan. 2018. Path-following through control funnel functions. arXiv\/1804.05288. Retrieved from https:\/\/arxiv:1804.05288.","DOI":"10.1109\/IROS.2018.8593637"},{"key":"e_1_2_1_55_1","unstructured":"Aion Robotics. [n.d.]. R1 ArduPilot Edition. Retrieved from https:\/\/docs.aionrobotics.com\/en\/latest\/r1-ugv.html.  Aion Robotics. [n.d.]. R1 ArduPilot Edition. Retrieved from https:\/\/docs.aionrobotics.com\/en\/latest\/r1-ugv.html."},{"key":"e_1_2_1_56_1","unstructured":"Sky Rocket. [n.d.]. Sky Viper Journey. Retrieved from https:\/\/sky-viper.com\/journey\/.  Sky Rocket. [n.d.]. Sky Viper Journey. Retrieved from https:\/\/sky-viper.com\/journey\/."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_2_1_58_1","volume-title":"Walmart Drone Delivery. Retrieved","author":"Sheilds Nicolas","year":"2018","unstructured":"Nicolas Sheilds . [n.d.]. Walmart Drone Delivery. Retrieved December 9, 2018 from https:\/\/www.businessinsider.com\/walmart-blockchain-drone-delivery-patent-2018-9. Nicolas Sheilds. [n.d.]. Walmart Drone Delivery. Retrieved December 9, 2018 from https:\/\/www.businessinsider.com\/walmart-blockchain-drone-delivery-patent-2018-9."},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the Cryptographic Hardware and Embedded Systems (CHES\u201913)","author":"Shoukry Yasser","year":"2013","unstructured":"Yasser Shoukry , Paul Martin , Paulo Tabuada , and Mani Srivastava . 2013 . Non-invasive spoofing attacks for anti-lock braking systems . In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES\u201913) , Guido Bertoni and Jean-Sebastien Coron (Eds.). Springer, Berlin, 55--72. Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2013. Non-invasive spoofing attacks for anti-lock braking systems. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES\u201913), Guido Bertoni and Jean-Sebastien Coron (Eds.). Springer, Berlin, 55--72."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831199"},{"key":"e_1_2_1_61_1","unstructured":"Christopher Steiner. [n.d.]. Bot-In-Time Delivery. Retrieved from https:\/\/www.forbes.com\/forbes\/2009\/0316\/040_bot_time_saves_nine.html#68ee53d9b942.  Christopher Steiner. [n.d.]. Bot-In-Time Delivery. Retrieved from https:\/\/www.forbes.com\/forbes\/2009\/0316\/040_bot_time_saves_nine.html#68ee53d9b942."},{"key":"e_1_2_1_62_1","unstructured":"Paparazzi Development Team. [n.d.]. Paparazzi\u2014The Free Autopilot. Retrieved from https:\/\/wiki.paparazziuav.org\/wiki\/Main_Page.  Paparazzi Development Team. [n.d.]. Paparazzi\u2014The Free Autopilot. Retrieved from https:\/\/wiki.paparazziuav.org\/wiki\/Main_Page."},{"key":"e_1_2_1_63_1","unstructured":"Pixhawk Development Team. [n.d.]. Pixhawk AutoPilot. Retrieved from https:\/\/docs.px4.io\/en\/flight_controller\/pixhawk_series.html.  Pixhawk Development Team. [n.d.]. Pixhawk AutoPilot. Retrieved from https:\/\/docs.px4.io\/en\/flight_controller\/pixhawk_series.html."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroSP\u201917)","author":"Trippel T.","year":"2017","unstructured":"T. Trippel , O. Weisse , W. Xu , P. Honeyman , and K. Fu . 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks . In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroSP\u201917) . 3--18. DOI:https:\/\/doi.org\/10.1109\/EuroSP. 2017 .42 10.1109\/EuroSP.2017.42 T. Trippel, O. Weisse, W. Xu, P. Honeyman, and K. Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroSP\u201917). 3--18. DOI:https:\/\/doi.org\/10.1109\/EuroSP.2017.42"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security (WIFS\u201915)","author":"Vuong T. P.","unstructured":"T. P. Vuong , G. Loukas , D. Gan , and A. Bezemskij . 2015. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles . In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security (WIFS\u201915) . 1--6. T. P. Vuong, G. Loukas, D. Gan, and A. Bezemskij. 2015. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security (WIFS\u201915). 1--6."},{"key":"e_1_2_1_68_1","volume-title":"Proceedings of the 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON\u201916)","author":"Yang Zhaolin","year":"2016","unstructured":"Zhaolin Yang , Feng Lin , and B. M. Chen . 2016. Survey of autopilot for multi-rotor unmanned aerial vehicles . In Proceedings of the 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON\u201916) . 6122--6127. DOI:https:\/\/doi.org\/10.1109\/IECON. 2016 .7793820 10.1109\/IECON.2016.7793820 Zhaolin Yang, Feng Lin, and B. M. Chen. 2016. Survey of autopilot for multi-rotor unmanned aerial vehicles. In Proceedings of the 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON\u201916). 6122--6127. DOI:https:\/\/doi.org\/10.1109\/IECON.2016.7793820"}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:42Z","timestamp":1750197702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3419474"],"URL":"https:\/\/doi.org\/10.1145\/3419474","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"value":"2692-1626","type":"print"},{"value":"2576-5337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}