Unveiling Security Weaknesses in Autonomous Driving Systems: An In-Depth Empirical Study

📅 2025-02-27
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Open-source autonomous driving systems (ADS) face critical security risks due to persistent high-severity vulnerabilities. Method: This study systematically identifies and analyzes critical vulnerabilities—specifically integer overflows (CWE-190) and input validation defects (CWE-20)—across Autoware, AirSim, and Apollo codebases using CodeQL. It conducts the first large-scale, cross-version empirical analysis of vulnerability lifecycles in ADS, integrating CWE classification and multi-version comparative tracking. Contribution/Results: CWE-190 (59.6%) and CWE-20 (16.1%) dominate the identified vulnerabilities. Over 60% of high-severity flaws remain unpatched for more than six months, demonstrating pronounced vulnerability persistence and delayed remediation. These findings empirically reveal systemic weaknesses in ADS security maintenance practices, highlighting significant gaps in vulnerability management maturity. The study provides both empirical evidence and a methodological framework—grounded in precise static analysis and longitudinal code evolution tracking—to advance ADS security robustness and inform proactive assurance strategies.

Technology Category

Application Category

📝 Abstract
The advent of Autonomous Driving Systems (ADS) has marked a significant shift towards intelligent transportation, with implications for public safety and traffic efficiency. While these systems integrate a variety of technologies and offer numerous benefits, their security is paramount, as vulnerabilities can have severe consequences for safety and trust. This study aims to systematically investigate potential security weaknesses in the codebases of prominent open-source ADS projects using CodeQL, a static code analysis tool. The goal is to identify common vulnerabilities, their distribution and persistence across versions to enhance the security of ADS. We selected three representative open-source ADS projects, Autoware, AirSim, and Apollo, based on their high GitHub star counts and Level 4 autonomous driving capabilities. Using CodeQL, we analyzed multiple versions of these projects to identify vulnerabilities, focusing on CWE categories such as CWE-190 (Integer Overflow or Wraparound) and CWE-20 (Improper Input Validation). We also tracked the lifecycle of these vulnerabilities across software versions. This approach allows us to systematically analyze vulnerabilities in projects, which has not been extensively explored in previous ADS research. Our analysis revealed that specific CWE categories, particularly CWE-190 (59.6%) and CWE-20 (16.1%), were prevalent across the selected ADS projects. These vulnerabilities often persisted for over six months, spanning multiple version iterations. The empirical assessment showed a direct link between the severity of these vulnerabilities and their tangible effects on ADS performance. These security issues among ADS still remain to be resolved. Our findings highlight the need for integrating static code analysis into ADS development to detect and mitigate common vulnerabilities.
Problem

Research questions and friction points this paper is trying to address.

Identifying security vulnerabilities in Autonomous Driving Systems.
Analyzing common vulnerabilities using CodeQL static analysis.
Tracking persistence and impact of vulnerabilities across versions.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Employed CodeQL for static analysis
Analyzed vulnerabilities in open-source ADS
Tracked vulnerability lifecycle across versions
🔎 Similar Papers
No similar papers found.
W
Wenyuan Cheng
School of Computer Science & Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, China
Zengyang Li
Zengyang Li
Associate Professor, School of Computer Science, Central China Normal University, Wuhan, China
Multilingual SoftwareIntelligent Software EngineeringTechnical DebtSoftware Architecture
Peng Liang
Peng Liang
School of Computer Science, Wuhan University
Software EngineeringSoftware ArchitectureEmpirical Software Engineering
Ran Mo
Ran Mo
Central China Normal University
Software Engineering
H
Hui Liu
School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, China