An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles

Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anom...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings / International Conference on Software Engineering pp. 2593 - 2605
Main Authors: Wang, Dinghua, Li, Shuqing, Xiao, Guanping, Liu, Yepang, Sui, Yulei, He, Pinjia, Lyu, Michael R.
Format: Conference Proceeding
Language:English
Published: ACM 14.04.2024
Subjects:
ISSN:1558-1225
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anomalies, which are often mani-fested in flight logs, to help assure the quality and safety of UAV systems. However, there has been limited research on investigating the code-level patterns of software bug-induced UAV anomalies. This impedes the development of effective tools for diagnosing and localizing bugs within UAV system code. To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject. We first collected 178 real-world abnormal logs induced by soft-ware bugs in two popular open-source UAV platforms, i.e., PX4 and Ardupilot. We then examined each of these abnormal logs and com-piled their common patterns. In particular, we investigated the most severe anomalies that led to UAV crashes, and identified their features. Based on our empirical findings, we further summarized the challenges of localizing bugs in system code by analyzing anoma-lous UAV flight data, which can offer insights for future research in this field.
AbstractList Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to software bugs that can lead to abnormal system behaviors and undesirable consequences. It is crucial to study such software bug-induced UAV anomalies, which are often mani-fested in flight logs, to help assure the quality and safety of UAV systems. However, there has been limited research on investigating the code-level patterns of software bug-induced UAV anomalies. This impedes the development of effective tools for diagnosing and localizing bugs within UAV system code. To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject. We first collected 178 real-world abnormal logs induced by soft-ware bugs in two popular open-source UAV platforms, i.e., PX4 and Ardupilot. We then examined each of these abnormal logs and com-piled their common patterns. In particular, we investigated the most severe anomalies that led to UAV crashes, and identified their features. Based on our empirical findings, we further summarized the challenges of localizing bugs in system code by analyzing anoma-lous UAV flight data, which can offer insights for future research in this field.
Author Li, Shuqing
Sui, Yulei
Lyu, Michael R.
Xiao, Guanping
Liu, Yepang
Wang, Dinghua
He, Pinjia
Author_xml – sequence: 1
  givenname: Dinghua
  surname: Wang
  fullname: Wang, Dinghua
  email: dinghua.wang@student.uts.edu.au
  organization: University of Technology Sydney,Australia
– sequence: 2
  givenname: Shuqing
  surname: Li
  fullname: Li, Shuqing
  email: sqli21@cse.cuhk.edu.hk
  organization: The Chinese University of Hong Kong,China
– sequence: 3
  givenname: Guanping
  surname: Xiao
  fullname: Xiao, Guanping
  email: gpxiao@nuaa.edu.cn
  organization: Nanjing University of Aeronautics and Astronautics,China
– sequence: 4
  givenname: Yepang
  surname: Liu
  fullname: Liu, Yepang
  email: liuyp1@sustech.edu.cn
  organization: Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology,Department of Computer Science and Engineering,China
– sequence: 5
  givenname: Yulei
  surname: Sui
  fullname: Sui, Yulei
  email: y.sui@unsw.edu.au
  organization: The University of New South Wales,Australia
– sequence: 6
  givenname: Pinjia
  surname: He
  fullname: He, Pinjia
  email: hepinjia@cuhk.edu.cn
  organization: School of Data Science, The Chinese University of Hong Kong,Shenzhen (CUHK-Shenzhen),China
– sequence: 7
  givenname: Michael R.
  surname: Lyu
  fullname: Lyu, Michael R.
  email: lyu@cse.cuhk.edu.hk
  organization: The Chinese University of Hong Kong,China
BookMark eNotj09LwzAcQKMoOGfPXjzkC3Tml1_-HsuYWih4cV5H2iYz0CajLeK-vQM9vdvjvXtyk3LyhDwC2wAI-YzSaslwgwotGHVFCqutEYxpxkGLa7ICKU0JnMs7UsxzbJkUKLUSuCJ1leju5zTkyS15OtM6fft5iUe3xJxoDrTJR1qlPLoh-pnGRPdpdCn5nlZ-im6gn_4rdoOfH8htcMPsi3-uyf5l97F9K5v313pbNaUDhUtpQjDWgA69Zk5b23HgASzqSxVz1tm2lQolmJ4H43wv-o4rZLLj2Ok-BFyTpz9v9N4fTlMc3XQ-wOXJSKPxFwtiTpU
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/3597503.3639186
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798400702174
EISSN 1558-1225
EndPage 2605
ExternalDocumentID 10548587
Genre orig-research
GrantInformation_xml – fundername: Natural Science Foundation of Jiangsu Province
  grantid: BK20200441
  funderid: 10.13039/501100004608
– fundername: National Natural Science Foundation of China
  grantid: 61932021,62002163,62102340
  funderid: 10.13039/501100001809
GroupedDBID -~X
.4S
.DC
29O
5VS
6IE
6IF
6IH
6IK
6IL
6IM
6IN
8US
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVWKF
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
EDO
FEDTE
I-F
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a163t-8ff89817fd70a799c212f1937b050a9a9bb563518d2f8aed4dc26305c23c7dff3
IEDL.DBID RIE
IngestDate Wed Aug 27 01:53:13 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a163t-8ff89817fd70a799c212f1937b050a9a9bb563518d2f8aed4dc26305c23c7dff3
PageCount 13
ParticipantIDs ieee_primary_10548587
PublicationCentury 2000
PublicationDate 2024-April-14
PublicationDateYYYYMMDD 2024-04-14
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-April-14
  day: 14
PublicationDecade 2020
PublicationTitle Proceedings / International Conference on Software Engineering
PublicationTitleAbbrev ICSE
PublicationYear 2024
Publisher ACM
Publisher_xml – name: ACM
SSID ssib054357643
ssib055306466
ssj0006499
Score 2.2702625
Snippet Unmanned aerial vehicles (UAVs) are becoming increasingly ubiqui-tous in our daily lives. However, like many other complex systems, UAVs are susceptible to...
SourceID ieee
SourceType Publisher
StartPage 2593
SubjectTerms Autonomous aerial vehicles
Bridges
Code Pattern
Codes
Complex systems
Computer bugs
Crash
Empirical Study
Safety
Software
Software Bug
UAV Anomaly
Title An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles
URI https://ieeexplore.ieee.org/document/10548587
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELYoYmAqjyLe8sCaksR27IwVogKpqjrQqlvl2GfoUAf1we_n7KbQhYEt8hSd7bvvfPd9R8hDpiouSgcJw-Qk4SKtEoQhKW4IUwVIC3l8zJkM5HCoptNy1JDVIxcGAGLzGXTDZ6zl29pswlMZ3nDE10LJFmlJWWzJWrvDIzDuyz1tqTAOp-ABqzRuuUBs32j7ZFw8MkTSImVdhiE6C0zqveEqMbb02__8qxPS-WXp0dFP_DklB-DPSHs3poE2t_acvPY83bbaxYo63ZPWqD2tHR3U77Tn6wVCcljRuadjv9DB_9JePJ90Ah-xe65Dxv3nt6eXpJmgkGjEWetEOadKlUlnZaplWRoMVA4hm0T7pLrUZVUJRByZsrlTGiy3Ji_QA5icGWmdYxfk0NceLgmVoJ22lVasSjkIzNScVqbCbCWIkBl-RTrBNLPPrUjGbGeV6z_Wb8hxjvggFGYyfksO18sN3JEj87Wer5b3cWu_ARCZoYw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagIMFUHkW88cCaksR27IwVompFqTq0VbfK8QM61EF98Ps5uyl0YWCLPEVn--47333fIfSYiIKy3JqIQHISURYXEcCQGDaEiMxwbdLwmDPu8X5fTCb5oCKrBy6MMSY0n5mm_wy1fF2qtX8qgxsO-JoJvo8OGKVpvKFrbY8Pg8jPd9Sl_ECcjHq0UjnmDNB9pe6TUPZEAEuzmDQJBOnEc6l3xquE6NKu__O_TlDjl6eHBz8R6BTtGXeG6ttBDbi6t-eo23J402wXaup4R1yjdLi0uFe-45Yr5wDKzRLPHB65ufQeGLfCCcVj8xH65xpo1H4ZPneiaoZCJAFprSJhrchFwq3mseR5riBUWQBtHOwTy1zmRcEAcyRCp1ZIo6lWaQY-QKVEcW0tuUA1VzpziTA30kpdSEGKmBoGuZqVQhWQr3gZMkWvUMObZvq5kcmYbq1y_cf6AzrqDN960163_3qDjlNAC75Mk9BbVFst1uYOHaqv1Wy5uA_b_A2o5qTT
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%2F+International+Conference+on+Software+Engineering&rft.atitle=An+Exploratory+Investigation+of+Log+Anomalies+in+Unmanned+Aerial+Vehicles&rft.au=Wang%2C+Dinghua&rft.au=Li%2C+Shuqing&rft.au=Xiao%2C+Guanping&rft.au=Liu%2C+Yepang&rft.date=2024-04-14&rft.pub=ACM&rft.eissn=1558-1225&rft.spage=2593&rft.epage=2605&rft_id=info:doi/10.1145%2F3597503.3639186&rft.externalDocID=10548587