Corpus ID: 51808484

Analysis of Vulnerabilities in Modern Unmanned Aircraft Systems

@inproceedings{Shashok2017AnalysisOV,
  title={Analysis of Vulnerabilities in Modern Unmanned Aircraft Systems},
  author={Nikolas Shashok},
  year={2017}
}
As unmanned aerial vehicles (or drones) become more prevalent in modern society, it is crucial that an understanding of the vulnerabilities present in drones becomes more widespread. This paper will discuss some of the modern uses of drones and the possible risks inherent in their use, and will go into detail on a number of vulnerabilities present in drones today, including GPS spoofing and jamming, drone-specific malware, and data extraction and reverse engineering. The goal of this paper is… Expand
Investigation of Drone Vulnerability and its Countermeasure
TLDR
Investigation of wireless network vulnerability of drones is presented including propose countermeasure policies for customers and vendors for preventing bad situation from an attacker. Expand
Cybersecurity in unmanned aerial vehicles (UAVs)
TLDR
This research is a comprehensive literature review investigating which cyber-attacks are most frequent and what consequences they cause in civilian UAV attacks. Expand
Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests
TLDR
A new UAV vulnerability is explored with related UAV security practices identified for possible exploitation using large streams of data sent at specific ports and countermeasures to combat the exploitation will be discussed. Expand
Security analysis of drones systems: Attacks, limitations, and recommendations
TLDR
The emerging threats of using drones in cyber-attacks are investigated, along the countermeasures to thwart these attacks, and various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed. Expand
Malicious Digital Penetration of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning the Complexity of Military UAVs and Hacking
OF THE THESIS Malicious Digital Penetration of United States Weaponized Military Unmanned Aerial Vehicles Systems: A National Security Perspective Concerning the Complexity of Military UAVs andExpand
A Game of Drones : Cyber Security in UAVs
As Unmanned Aerial Vehicles (UAVs) are getting more popular and their area of use is expanding rapidly, the security aspect becomes important to investigate. This thesis is a systematic literature ...
Internet of Drones Intrusion Detection Using Deep Learning
Flying Ad Hoc Network (FANET) or drones’ technologies have gained much attraction in the last few years due to their critical applications. Therefore, various studies have been conducted onExpand

References

SHOWING 1-6 OF 6 REFERENCES
Exploring security vulnerabilities of unmanned aerial vehicles
TLDR
This demo presents the security gaps of a professional UAV, which is used for critical operations by police forces around the world, and demonstrates how one can exploit the identified security vulnerabilities, perform a Man-in-the-Middle attack, and inject control commands to interact with the compromised UAV. Expand
GPS signal jamming and anti-jamming strategy — A theoretical analysis
The weak strength of GPS signal makes it very vulnerable to jamming. This calls for appropriate modeling and implementation of GPS signal source and jammers that are used to jam GPS signal. TheExpand
’We hacked U.S. drone’: Iran claims it electronically hijacked spy aircraft’s GPS and tricked aircraft into landing on its soil
  • Daily Mail Online,
  • 2017
Maldrone the First Backdoor for drones. - Blogs - Garage4hackers Forum
  • Garage4hackers Forum,
  • 2015
SkyJack: autonomous drone hacking
  • Samy.pl,
  • 2013
UT Austin Researchers Spoof Superyacht at Sea - Cockrell School of Engineering
  • Engr.utexas.edu,
  • 2013