Out of Control: Stealthy Attacks on Robotic Vehicles Protected by - - PowerPoint PPT Presentation

out of control stealthy attacks on robotic vehicles
SMART_READER_LITE
LIVE PREVIEW

Out of Control: Stealthy Attacks on Robotic Vehicles Protected by - - PowerPoint PPT Presentation

Out of Control: Stealthy Attacks on Robotic Vehicles Protected by Control-Based Techniques Pritam Dash, Mehdi Karimi, and Karthik Pattabiraman University of British Columbia, Vancouver, Canada 1 Robotic Vehicle (RV) in Industrial Sector


slide-1
SLIDE 1

Out of Control: Stealthy Attacks on Robotic Vehicles Protected by Control-Based Techniques

Pritam Dash, Mehdi Karimi, and Karthik Pattabiraman

University of British Columbia, Vancouver, Canada

1

slide-2
SLIDE 2

Robotic Vehicle (RV) in Industrial Sector

  • Autonomous UAVs and Rovers.
  • Delivery
  • Warehouse Management
  • Surveillance
  • Cinematography
  • Agriculture
  • Space research.
  • On demand medical supplies.

Autonomous RVs are increasingly becoming popular. RV missions are time critical.

2

slide-3
SLIDE 3

Motivation

  • GPS spoofing [ION GNSS’12], Optical spoofing [CCS’11]
  • Acoustic noise injection in MEMS gyroscope [Usenix’15], MEMS

accelerometer [Euro S&P’17]

Major Saudi Arabia oil facilities hit by drone strikes Sep 2019

Can an attacker remain stealthy and trigger adversarial actions?

3

slide-4
SLIDE 4

Robotic Vehicle System

  • Cyber component
  • Physical component

4

slide-5
SLIDE 5

Robotic Vehicle System

  • Cyber component
  • Physical component

5

slide-6
SLIDE 6

Robotic Vehicle System

  • Cyber component
  • Physical component

6

slide-7
SLIDE 7

Robotic Vehicle System

  • Cyber component
  • Physical component

7

slide-8
SLIDE 8

Autonomous Control in RVs

  • Control algorithms
  • Position Controller
  • Attitude Controller
  • Modes of Operation
  • A typical drone mission à at least 3

modes.

8

slide-9
SLIDE 9

Control-based Attack Detection Techniques

  • Control Invariants (CI) [CCS’18]
  • State Space Model to predict target

angles.

  • Extended Kalman Filter (EKF)
  • Residual analysis à sensor or

actuator attacks

Attack

9

Time in seconds Roll Angle in Degrees

slide-10
SLIDE 10

Limitations in Control-based Detection

  • Fixed threshold
  • Large threshold to reduce False Positives (FP).
  • Environmental factors – friction, wind
  • Sensor faults.
  • Fixed Monitoring windows
  • Often fail to accommodate dynamic mode change
  • Takeoff à Waypoint 1 à Waypoint 2.
  • Waypoint à Land.

Stealthy Attacks

False Data Injection Artificial Delay Switch Mode Attack

10

slide-11
SLIDE 11

Attack Model

137.50, -139.40 137.49, -139.22 Yaw = 121.69 Roll = 0.14 Pitch =-15.16 Yaw = 122.2 Roll = -0.13 Pitch =-15.46 Yaw = 122.45 Roll = -0.20 Pitch =16.72

  • Cannot tamper with the firmware.
  • Cannot have root access to the RV system.
  • Does not know the physical properties and detailed

specifications of the RV.

137.50, -140.40 11

slide-12
SLIDE 12

Attack 1: False Data Injection Attack

  • Tampering sensor measurements
  • Inject false data à sensor
  • Acoustic noise
  • False Data Injection
  • Delivery at a wrong location
  • Misplacements in warehouse
  • [Usenix’15] Son et. al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors

12

slide-13
SLIDE 13

Attack 2: Artificial Delay Attack

  • Delay system operations
  • Mode changes
  • Motor commands
  • Artificial delay attack
  • Delay receiving commands
  • Delays RV mission

13

slide-14
SLIDE 14

Attack 3: Switch Mode Attack

  • Initiated when a mode change is triggered.
  • Steady-state flight à Land
  • Takeoff à Waypoint
  • Switch mode attack
  • Gain elevation instead of

landing

  • Potential crash

Launch Attack

14

slide-15
SLIDE 15

Our Approach to Stealthy Attacks

  • Challenges
  • Deriving the Detection threshold employed by CI and EKF.
  • Stealthy sensor tampering attacks – FDI, SM
  • Deriving the Monitoring window employed by control based IDS.
  • Artificial delays in control flow.

15

slide-16
SLIDE 16

State Estimation Model

  • Collect mission profile data either from real RVs or simulations.
  • RVs autonomous flight control
  • Various mission trajectories.

https://www.mathworks.com/help/ident/gs/about-system-identification.html 16

slide-17
SLIDE 17

Triggering Stealthy Attacks at Runtime

  • Controlled acoustic noise.
  • Malicious libraries and wrapper.
  • Exploiting dynamic linking feature
  • Tampering gyroscopic sensor measurement
  • Running resource intensive operations à Delays
  • Tampering motor thrust output.

[DSN’16] Alemzadeh et. al. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.

17

slide-18
SLIDE 18

Results and Evaluation

RQ1 How much effort does the attacker need to expend to derive the state estimation model? RQ2 What are the impacts of the stealthy attacks on the subject RVs? RQ3 How effective are the attacks in achieving the attacker’s objectives?

§ ArduPilot - http://ardupilot.org/ § Pixhawk - https://pixhawk.org/ § Aion R1 Rover - https://www.aionrobotics.com/r1

18

slide-19
SLIDE 19

RQ1: Attacker’s Effort

  • Attacker’s effort in deriving the state

estimation model.

  • Two Phases
  • Model extraction phase

– 15 missions each subject RV.

  • Model testing phase

– 5 missions each subject RV.

  • Convergence
  • 5-7 missions for all the subject RVs.

19

slide-20
SLIDE 20

R2Q: Impacts of Stealthy Attacks

  • False data injection attack
  • Deviates RV from its trajectory.
  • Artificial delay attacks
  • Delays mission time
  • Drones à At least 25%
  • Rovers à At least 30%
  • Switch mode attack (applicable to drone)
  • Crash landing
  • Land at wrong locations.

20

slide-21
SLIDE 21

RQ3: Stealthy Attacks in Industrial Scenarios

  • Delivery drones
  • Typical mission duration 30 mins.
  • Distance covered 1 – 20 KM
  • False data injection
  • deviation more than 100 meters.
  • Artificial delay
  • increase mission time by 25-30%.
  • Switch mode
  • Ignore commands.
  • crash landing.

21

slide-22
SLIDE 22

How to Detect Stealthy Attacks?

  • Large detection threshold enables stealthy attacks.
  • Improved system modelling à accurate estimations.
  • Smaller Thresholds, smaller monitoring windows.
  • Inability to model the mode change states.
  • Modelling the Non-linear and Dynamic behavior during RV mission.
  • Improved noise filtering techniques
  • Prevent sensor manipulation
  • Increase the production cost

22

slide-23
SLIDE 23

Summary

  • Vulnerabilities in control theory based attack detection techniques.
  • Demonstrate three types of stealthy attacks on RV simulator and real

RV systems.

  • Attacks deviate a RVs by more than 100 meters, increases duration of RV

mission by 25-30%, even result in crashes.

  • Demonstrate techniques to automate the attacks on a class of RVs.

Pritam Dash pdash@ece.ubc.ca Artifacts: https://github.com/DependableSystemsLab/stealthy-attacks

23