DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing

  • Seulbae Kim
  • , Major Liu
  • , Junghwan "john" Rhee
  • , Yuseok Jeon
  • , Yonghwi Kwon
  • , Chung Hwan Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Autonomous driving has become real; semi-autonomous driving vehicles in an affordable price range are already on the streets, and major automotive vendors are actively developing full self-driving systems to deploy them in this decade. Before rolling the products out to the end-users, it is critical to test and ensure the safety of the autonomous driving systems, consisting of multiple layers intertwined in a complicated way. However, while safety-critical bugs may exist in any layer and even across layers, relatively little attention has been given to testing the entire driving system across all the layers. Prior work mainly focuses on white-box testing of individual layers and preventing attacks on each layer. In this paper, we aim at holistic testing of autonomous driving systems that have a whole stack of layers integrated in their entirety. Instead of looking into the individual layers, we focus on the vehicle states that the system continuously changes in the driving environment. This allows us to design DriveFuzz, a new systematic fuzzing framework that can uncover potential vulnerabilities regardless of their locations. DriveFuzz automatically generates and mutates driving scenarios based on diverse factors leveraging a high-fidelity driving simulator. We build novel driving test oracles based on the real-world traffic rules to detect safety-critical misbehaviors, and guide the fuzzer towards such misbehaviors through driving quality metrics referring to the physical states of the vehicle. DriveFuzz has discovered 30 new bugs in various layers of two autonomous driving systems (Autoware and CARLA Behavior Agent) and three additional bugs in the CARLA simulator. We further analyze the impact of these bugs and how an adversary may exploit them as security vulnerabilities to cause critical accidents in the real world.

Original languageEnglish
Title of host publicationCCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1753-1767
Number of pages15
ISBN (Electronic)9781450394505
DOIs
Publication statusPublished - 2022 Nov 7
Externally publishedYes
Event28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022 - Hybrid, Los Angeles, United States
Duration: 2022 Nov 72022 Nov 11

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022
Country/TerritoryUnited States
CityHybrid, Los Angeles
Period22/11/722/11/11

Bibliographical note

Publisher Copyright:
© 2022 ACM.

Keywords

  • autonomous driving system
  • fuzzing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing'. Together they form a unique fingerprint.

Cite this