–University of British Columbia
Researchers executed successful stealth attacks on real and simulated robotic vehicles, revealing vulnerabilities in the attack detection system most commonly used by such vehicles.
Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, new research from the University of British Columbia suggests.
The researchers, based at UBC’s faculty of applied science, designed three types of stealth attack on robotic vehicles that caused the machines to crash, miss their targets or complete their missions much later than scheduled.
The attacks required little to no human intervention to succeed on both real and simulated drones and rovers.
“We saw major weaknesses in robotic vehicle software that could allow attackers to easily disrupt the behaviour of many different kinds of these machines,” said Karthik Pattabiraman, the electrical and computer engineering professor who supervised the study. “Especially worrisome is the fact that none of these attacks could be detected by the most commonly used detection techniques.”
Robotic vehicles use special algorithms to stay on track while in motion, as well as to flag unusual behaviour that could signal an attack. But some degree of deviation from the travel plan is typically allowed to account for external factors like friction and wind — and it’s these deviations that attackers can exploit to throw the vehicles off course.
The UBC team developed an automated process that enables an attacker to quickly learn the allowed deviations of robotic vehicles running conventional protection systems. Hackers can then use the information to launch a series of automated attacks that the vehicle cannot detect until it’s too late.
“Robotic vehicles are already playing an important role in surveillance, warehouse management and other contexts, and their use will only become more widespread in the future,” says Pritam Dash, an electrical and computer engineering graduate student at UBC and the study’s lead author. “We need safety measures to prevent rogue drones and rovers from causing serious economic, property and even bodily harm.”
The researchers offer the basis for a few such countermeasures — including self-adjusting deviation thresholds — in a recent paper describing their findings. They will present their work at the Annual Computer Security Applications Conference in San Juan, Puerto Rico, next month.
Related posts
The Miss Universe-Greatest Celebration of Women
-SOFIE ZERUTO The Miss Universe Organization is a global, inclusive of organizations that celebrates all cultures, backgrounds and religions. It creates and provide a safe space for women to share their stories and drive impact personally, professionally, and philanthropically. The women who participate in this…
All Africa Music Awards; Categories and Regions
-MUSIC IN AFRICA All Africa Music Awards (also referred to as AFRIMA) is an annual awards event. The awards event was established by the International Committee AFRIMA, in collaboration with the African Union (AU) to reward and celebrate musical works, talents and creativity around the African continent while promoting…
African Acts And The Grammy Award
-FUMILAYO KANMODI African music is now getting much-deserved recognition, and talented stars have been rewarded for their hard work. One award many covet has always been the Grammy Award, and we have had African acts that have received the award. In our little way of…
Nigeria’s Former Jonathan Tells African Leaders To Put Humanity First
Joke Falaju, Abuja Bags African Heritage awardFormer President Goodluck Jonathan has urged African leaders privilege to hold public offices to become servants of the people, and not turn themselves into the “bosses of the people”.Jonathan stated this while receiving the African Democracy and Peace Icon…
The Risk And Reward Of ChatGPT In Cybersecurity
Juan is an experienced CTO with a demonstrated history of working in the computer and network security industry. He is an information technology professional skilled in SAP and Oracle applications, computer forensics, vulnerabilities research, IPS/IDS and information security. Unless you’ve been on a retreat in…
Explained – History Of Money From Fiat To Crypto
What is money? Money as a concept has been a cornerstone of human civilization and economic development. To start with the latter, money is a method of storing value and worth, and it also functions as a medium of exchange that allows individuals to exchange…
Studies Show That Nigerian Crypto Foreign Investment Is At A Record Low
Foreign direct investment in Nigeria fell by 33% last year due to a severe shortage of dollars, which discouraged crypto companies from expanding into the country. The largest economy in Africa has a foreign investment problem despite exponential growth in crypto adoption. The National Bureau…
Growing The Bitcoin Development Ecosystem In Africa
– Abubakar Nur Khalil | Bitcoin Magazine Bitcoin development in Africa, with a proper regulatory environment, could equally accelerate the continent and the technology. In this piece, we’ll be analyzing the current state of the Bitcoin developer ecosystem in Africa, ways to improve it and…