Robotic Vehicles (RVs) have gained great popularity over the past few years. Meanwhile, they are also demonstrated to be vulnerable to sensor spoofing attacks. Although a wealth of research works have presented various attacks, some key questions remain unanswered: are these existing works complete enough to cover all the sensor spoofing threats? If not, how many attacks are not explored, and how difficult is it to realize them? This paper answers the above questions by comprehensively systematizing the knowledge of sensor spoofing attacks against RVs. Our contributions are threefold. (1) We identify seven common attack paths in an RV system pipeline. We categorize and assess existing spoofing attacks from the perspectives of spoofer property, operation, victim characteristic and attack goal. Based on this systematization, we identify 4 interesting insights about spoofing attack designs. (2) We propose a novel action flow model to systematically describe robotic function executions and unexplored sensor spoofing threats. With this model, we successfully discover 103 spoofing attack vectors, 26 of which have been verified by prior works, while 77 attacks are never considered. (3) We design two novel attack methodologies to verify the feasibility of newly discovered spoofing attack vectors.
翻译:过去几年来,机器人(RVs)受到极大欢迎。 同时,我们的贡献是三重的。 (1) 我们从一个RV系统管道中找出了七条共同攻击路径。 我们从螺旋形财产、操作、受害者特征和攻击目标的角度,对现有的攻击进行分类和评估。 基于这一系统化,我们找出4种关于潜伏攻击设计的有趣见解。 (2) 我们提出一个新的行动流动模式,系统地描述机器人功能处决和未爆炸传感器威胁。我们用这个模式成功地发现了103条攻击矢量,其中26条已经经过先前工程的核实,而77条攻击的病媒则从未被考虑。 (3) 我们设计了两种新式攻击方法,以核查新式攻击方法。</s>