An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles
Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anom...
Gespeichert in:
| Veröffentlicht in: | Proceedings / International Conference on Software Engineering S. 2593 - 2605 |
|---|---|
| Hauptverfasser: | , , , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
ACM
14.04.2024
|
| Schlagworte: | |
| ISSN: | 1558-1225 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anomalies, which are often mani-fested in flight logs, to help assure the quality and safety of UAV systems. However, there has been limited research on investigating the code-level patterns of software bug-induced UAV anomalies. This impedes the development of effective tools for diagnosing and localizing bugs within UAV system code. To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject. We first collected 178 real-world abnormal logs induced by soft-ware bugs in two popular open-source UAV platforms, i.e., PX4 and Ardupilot. We then examined each of these abnormal logs and com-piled their common patterns. In particular, we investigated the most severe anomalies that led to UAV crashes, and identified their features. Based on our empirical findings, we further summarized the challenges of localizing bugs in system code by analyzing anoma-lous UAV flight data, which can offer insights for future research in this field. |
|---|---|
| AbstractList | Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anomalies, which are often mani-fested in flight logs, to help assure the quality and safety of UAV systems. However, there has been limited research on investigating the code-level patterns of software bug-induced UAV anomalies. This impedes the development of effective tools for diagnosing and localizing bugs within UAV system code. To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject. We first collected 178 real-world abnormal logs induced by soft-ware bugs in two popular open-source UAV platforms, i.e., PX4 and Ardupilot. We then examined each of these abnormal logs and com-piled their common patterns. In particular, we investigated the most severe anomalies that led to UAV crashes, and identified their features. Based on our empirical findings, we further summarized the challenges of localizing bugs in system code by analyzing anoma-lous UAV flight data, which can offer insights for future research in this field. |
| Author | Li, Shuqing Sui, Yulei Lyu, Michael R. Xiao, Guanping Liu, Yepang Wang, Dinghua He, Pinjia |
| Author_xml | – sequence: 1 givenname: Dinghua surname: Wang fullname: Wang, Dinghua email: dinghua.wang@student.uts.edu.au organization: University of Technology Sydney,Australia – sequence: 2 givenname: Shuqing surname: Li fullname: Li, Shuqing email: sqli21@cse.cuhk.edu.hk organization: The Chinese University of Hong Kong,China – sequence: 3 givenname: Guanping surname: Xiao fullname: Xiao, Guanping email: gpxiao@nuaa.edu.cn organization: Nanjing University of Aeronautics and Astronautics,China – sequence: 4 givenname: Yepang surname: Liu fullname: Liu, Yepang email: liuyp1@sustech.edu.cn organization: Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology,Department of Computer Science and Engineering,China – sequence: 5 givenname: Yulei surname: Sui fullname: Sui, Yulei email: y.sui@unsw.edu.au organization: The University of New South Wales,Australia – sequence: 6 givenname: Pinjia surname: He fullname: He, Pinjia email: hepinjia@cuhk.edu.cn organization: School of Data Science, The Chinese University of Hong Kong,Shenzhen (CUHK-Shenzhen),China – sequence: 7 givenname: Michael R. surname: Lyu fullname: Lyu, Michael R. email: lyu@cse.cuhk.edu.hk organization: The Chinese University of Hong Kong,China |
| BookMark | eNotj09LwzAcQKMoOGfPXjzkC3Tml1_-HsuYWih4cV5H2iYz0CajLeK-vQM9vdvjvXtyk3LyhDwC2wAI-YzSaslwgwotGHVFCqutEYxpxkGLa7ICKU0JnMs7UsxzbJkUKLUSuCJ1leju5zTkyS15OtM6fft5iUe3xJxoDrTJR1qlPLoh-pnGRPdpdCn5nlZ-im6gn_4rdoOfH8htcMPsi3-uyf5l97F9K5v313pbNaUDhUtpQjDWgA69Zk5b23HgASzqSxVz1tm2lQolmJ4H43wv-o4rZLLj2Ok-BFyTpz9v9N4fTlMc3XQ-wOXJSKPxFwtiTpU |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3597503.3639186 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9798400702174 |
| EISSN | 1558-1225 |
| EndPage | 2605 |
| ExternalDocumentID | 10548587 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Natural Science Foundation of Jiangsu Province grantid: BK20200441 funderid: 10.13039/501100004608 – fundername: National Natural Science Foundation of China grantid: 61932021,62002163,62102340 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X .4S .DC 29O 5VS 6IE 6IF 6IH 6IK 6IL 6IM 6IN 8US AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS ARCSS AVWKF BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO EDO FEDTE I-F IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a163t-8ff89817fd70a799c212f1937b050a9a9bb563518d2f8aed4dc26305c23c7dff3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 01:53:13 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a163t-8ff89817fd70a799c212f1937b050a9a9bb563518d2f8aed4dc26305c23c7dff3 |
| PageCount | 13 |
| ParticipantIDs | ieee_primary_10548587 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-April-14 |
| PublicationDateYYYYMMDD | 2024-04-14 |
| PublicationDate_xml | – month: 04 year: 2024 text: 2024-April-14 day: 14 |
| PublicationDecade | 2020 |
| PublicationTitle | Proceedings / International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2024 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssib054357643 ssib055306466 ssj0006499 |
| Score | 2.2702625 |
| Snippet | Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 2593 |
| SubjectTerms | Autonomous aerial vehicles Bridges Code Pattern Codes Complex systems Computer bugs Crash Empirical Study Safety Software Software Bug UAV Anomaly |
| Title | An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles |
| URI | https://ieeexplore.ieee.org/document/10548587 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwEMctWjEwlUcRb3lgTUlsx4-xQlQgVVUHirpVjh_QoQ7qg8_P2U2hCwNblMk623c_-e5_h9A9K4VQXupMC8oz5gqWVcyTzAB9lNaUORVJKDwUo5GcTtW4EasnLYxzLhWfuV78TLl8W5tNfCqDGw58XUrRQi0h-FastTs8JcR9sddbKo7D4SyySuOWObB909unYOUDBZKGlfQohOgiKqn3hquk2DLo_HNVx6j7q9LD45_4c4IOXDhFnd2YBtzc2jP00g94W2qXMup4r7VGHXDt8bB-x_1QLwDJ3QrPA56EhY7-F_fT-cRv7iNVz3XRZPD0-vicNRMUMg2ctc6k91LJQngrci2UMhCoPCCbAPvkWmlVVSUQRyEtgf1ylllDOHgAQ6gR1nt6jtqhDu4CYS55NJisrKeM5FRZb4gRlbZVRbTJL1E3mmb2uW2SMdtZ5eqP_9foiAAfxMRMwW5Qe73cuFt0aL7W89XyLm3tNyfKohQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagIMFUHkW88cCaksR2bI8VompFqDq0qFvl-AEMTVAf_H7ObgpdGNiiTNZn-75PvvvuELqnjHPphIoUJ1lEbUKjgro00qA-mNEsJjwYhXM-GIjJRA5rs3rwwlhrQ_GZbfvPkMs3lV75pzK44aCvmeC7aI9RmsZru9bm-DBgfr7VXcoPxMmoVyt1YM5A3dfdfRLKHghoaVhLmwBJJ95LvTVeJbBLt_nPdR2h1q9PDw9_GOgY7djyBDU3gxpwfW9PUb9T4nWxXcip463mGlWJK4fz6g13ymoGotwu8EeJx-VM-QiMO-GE4lf7HurnWmjcfRo99qJ6hkKkQGktI-GckCLhzvBYcSk1UJUD0cYBn1hJJYuCgeZIhElhx6yhRqcZxACdEs2Nc-QMNcqqtOcIZyLzgInCOALgE2mcTjUvlCmKVOn4ArU8NNPPdZuM6QaVyz_-36GD3ugln-b9wfMVOkxBLfg0TUKvUWM5X9kbtK-_lh-L-W3Y5m_HiaVb |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%2F+International+Conference+on+Software+Engineering&rft.atitle=An+Exploratory+Investigation+of+Log+Anomalies+in+Unmanned+Aerial+Vehicles&rft.au=Wang%2C+Dinghua&rft.au=Li%2C+Shuqing&rft.au=Xiao%2C+Guanping&rft.au=Liu%2C+Yepang&rft.date=2024-04-14&rft.pub=ACM&rft.eissn=1558-1225&rft.spage=2593&rft.epage=2605&rft_id=info:doi/10.1145%2F3597503.3639186&rft.externalDocID=10548587 |