Real-Time Attack Detection System Using Event-Based Runtime Monitoring in ROS 2 |
Kang, Jeonghwan
(Pusan National University)
Seo, Minseong (Pusan National University) Park, Jaeyeol (Pusan National University) Kwon, Donghyun (Pusan National University) |
1 | Jongkil Kim, J. M. Smereka, Calvin Cheung, Surya Nepal, and Marthie Grobler, "Security and performance considerations in ros 2: A balancing act." arXiv preprint arXiv:1809.09566, Sep. 2018. |
2 | Patrice Lacroix and Jules Desharnais. "Buffer Overflow Vulnerabilities in C and C++." Rapport de Recherche DIUL-RR-0803, Universite Laval, Quebec, Canada, Aug. 2008. |
3 | Saleh M. Alnaeli et al. "Vulnerable C/C++ code usage in IoT software systems." 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), IEEE, pp. 348-352, Dec. 2016. |
4 | Angelo Ferrando, et al. "ROSMonitoring: a runtime verification framework for ROS." Annual Conference Towards Autonomous Robotic Systems. Springer, Cham, pp. 387-399, Dec. 2020. |
5 | Sean Rivera, et al. "ROS-FM: Fast Monitoring for the Robotic Operating System (ROS)." 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, pp. 187-196, Oct. 2020. |
6 | Mathieu Desnoyers and Michel R. Dagenais. "The lttng tracer: A low impact performance and behavior monitor for gnu/linux," Proceedings of the Linux Symposium, OLS (Ottawa Linux Symposium), pp. 209-224, Jul. 2006. |
7 | The LTTng Project, "The LTTng Documentation", https://lttng.org/docs/v2.11/, 2021 |
8 | Salima Omar, Asri Ngadi, and Hamid H. Jebur. "Machine learning techniques for anomaly detection: anoverview." International Journal of Computer Applications, vol. 79, no. 2, pp. 33-41, Oct. 2013. DOI |
9 | Varun Chandola, Arindam Banerjee, and Vipin Kumar. "Anomaly detection: A survey." ACM computing surveys (CSUR), vol. 41, no. 3, pp. 1-58, Jul. 2009. |
10 | Anam Tahir, et al. "Swarms of unmanned aerial vehicles-a survey." Journal of Industrial Information Integration, vol. 16, Dec. 2019 DOI |
11 | Ruffin White, Henrik Christensen, and Morgan Quigley, "SROS: Securing ROS over the wire, in the graph, and through the kernel." arXiv preprint arXiv:1611.07060, Nov. 2016. |
12 | Rizk, Yara, Mariette Awad, and Edward W. Tunstel. "Cooperative heterogeneous multi-robot systems: A survey," ACM Computing Surveys (CSUR), vol. 52, no. 2, pp. 1-31, Apr. 2019. |
13 | Twinkle Jain and Gene Cooperman. "DMTCP: Fixing the single point of failure of the ros master", ROSCon 2017, Sep. 2017. |
14 | Pushyami Kaveti and Hanumant Singh. "ROS rescue: fault tolerance system for robot operating system." Robot Operating System (ROS), Studies in Computational Intelligence, vol 895, Springer, Cham, pp. 381-397, 2021. |
15 | Jose D'Abruzzo Pereira, Naghmeh Ivaki, and Marco Vieira. "Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects." IEEE Access, vol 9, pp. 142879-142892, Oct. 2021. DOI |
16 | Jeff Huang, et al. "ROSRV: Runtime verification for robots." International Conference on Runtime Verification. Springer, Cham, pp. 247-254, 2014. |
17 | Christophe Bedard, Ingo Lutkebohle, and Michel Dagenais. "ros2_tracing: Multipurpose Low-Overhead Framework for Real-Time Tracing of ROS 2." IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 6511-6518, Jul. 2022. DOI |
18 | Qiang Liu, Tao Han, and Nirwan Ansari. "Learning-assisted secure end-to-end network slicing for cyber-physical systems." IEEE Network, vol. 34, no. 3, pp. 37-43, Jun. 2020. DOI |
19 | Babeltrace, "Babeltrace2 documentation", https://babeltrace.org/docs/v2.0/man7/babeltrace2-intro.7/, |
20 | efficios/babeltrace, "babeltrace", https://github.com/efficios/babeltrace, 2021 |
21 | Vedanth Narayanan and Rakesh B. Bobba. "Learning based anomaly detection for industrial arm applications." Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 13-23 Oct. 2018. |
22 | Kang-uk Seo, and Huy-kang Kim, "Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle", Journal of The Korea Institute of Information Security and Cryptology, 32(1), pp. 39-48, Feb. 2022. DOI |
23 | Hazim Shakhatreh, et al. "Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges." IEEE Access, vol. 7, pp. 48572-48634, Apr. 2019. DOI |
24 | Marc Pichler, Bernhard Dieber, and Martin Pinzger. "Can i depend on you? mapping the dependency and quality landscape of ros packages." 2019 third IEEE international conference on robotic computing (IRC), IEEE, pp. 78-85, Feb. 2019. |
25 | Varun Chandola, Arindam Banerjee, and Vipin Kumar. "Anomaly detection for discrete sequences: A survey." IEEE transactions on knowledge and data engineering, vol. 24, no. 5, pp. 823-839, May. 2012. DOI |