–University of British Columbia
Researchers executed successful stealth attacks on real and simulated robotic vehicles, revealing vulnerabilities in the attack detection system most commonly used by such vehicles.
Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, new research from the University of British Columbia suggests.
The researchers, based at UBC’s faculty of applied science, designed three types of stealth attack on robotic vehicles that caused the machines to crash, miss their targets or complete their missions much later than scheduled.
The attacks required little to no human intervention to succeed on both real and simulated drones and rovers.
“We saw major weaknesses in robotic vehicle software that could allow attackers to easily disrupt the behaviour of many different kinds of these machines,” said Karthik Pattabiraman, the electrical and computer engineering professor who supervised the study. “Especially worrisome is the fact that none of these attacks could be detected by the most commonly used detection techniques.”
Robotic vehicles use special algorithms to stay on track while in motion, as well as to flag unusual behaviour that could signal an attack. But some degree of deviation from the travel plan is typically allowed to account for external factors like friction and wind — and it’s these deviations that attackers can exploit to throw the vehicles off course.
The UBC team developed an automated process that enables an attacker to quickly learn the allowed deviations of robotic vehicles running conventional protection systems. Hackers can then use the information to launch a series of automated attacks that the vehicle cannot detect until it’s too late.
“Robotic vehicles are already playing an important role in surveillance, warehouse management and other contexts, and their use will only become more widespread in the future,” says Pritam Dash, an electrical and computer engineering graduate student at UBC and the study’s lead author. “We need safety measures to prevent rogue drones and rovers from causing serious economic, property and even bodily harm.”
The researchers offer the basis for a few such countermeasures — including self-adjusting deviation thresholds — in a recent paper describing their findings. They will present their work at the Annual Computer Security Applications Conference in San Juan, Puerto Rico, next month.
Nigeria’s Former Jonathan Tells African Leaders To Put Humanity First
Joke Falaju, Abuja Bags African Heritage awardFormer President Goodluck Jonathan has urged African leaders privilege to hold public offices to become servants of the people, and not turn themselves into the “bosses of the people”.Jonathan stated this while receiving the African Democracy and Peace Icon…
7th Edition Connected Banking Summit East Africa – Innovation & Excellence Awards 2023 Concludes
POSTED ON MARCH 28, 2023 BY AFRICA BUSINESS The Summit brought together the best and brightest minds in the banking, financial services, fintechs and techfin sectors. The event, which took place on 7th March 2023, featured insightful speakers, award-winning companies, and top-notch sponsors. Attendees were treated to a range…
2020 Awards | Social Media For Social Good Award Announces 100 Micro & Macro Social Media Influencers For Good
Social Media For Social Good Award Announces 100 Micro & Macro Social Media Influencers For Good and Set To Award 25 Of Them On The 13th Of June 2020. The most anticipated list of Nigerians using social media for social good which is curated by…
Ergonomic Furniture Dealer Formfunc Studio Awarded SA’s First 6-Star Green Star Award
-African Independent The Green Building Council of South Africa (GBCSA) has awarded Cape Town-based Formfunc Studio, a leading ergonomic furniture supplier, a 6-star Green Star rating following the recent fit-out of their office, showroom and DC in Johannesburg. The project, led by specialist sustainability and…
The Risk And Reward Of ChatGPT In Cybersecurity
Juan is an experienced CTO with a demonstrated history of working in the computer and network security industry. He is an information technology professional skilled in SAP and Oracle applications, computer forensics, vulnerabilities research, IPS/IDS and information security. Unless you’ve been on a retreat in…
Explained – History Of Money From Fiat To Crypto
What is money? Money as a concept has been a cornerstone of human civilization and economic development. To start with the latter, money is a method of storing value and worth, and it also functions as a medium of exchange that allows individuals to exchange…
Studies Show That Nigerian Crypto Foreign Investment Is At A Record Low
Foreign direct investment in Nigeria fell by 33% last year due to a severe shortage of dollars, which discouraged crypto companies from expanding into the country. The largest economy in Africa has a foreign investment problem despite exponential growth in crypto adoption. The National Bureau…
Growing The Bitcoin Development Ecosystem In Africa
– Abubakar Nur Khalil | Bitcoin Magazine Bitcoin development in Africa, with a proper regulatory environment, could equally accelerate the continent and the technology. In this piece, we’ll be analyzing the current state of the Bitcoin developer ecosystem in Africa, ways to improve it and…