Proceedings 2023 Network and Distributed System Security Symposium 2023
DOI: 10.14722/ndss.2023.24217
|View full text |Cite
|
Sign up to set email alerts
|

Drone Security and the Mysterious Case of DJI's DroneID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Later, the author added features such as attacking 802.11 protocol targets and providing a gui to the existing DRAT, and released it through ICIEA in 2021 [12]. N Schiller designed and implemented a decoder that works with DUML, a proprietary tracking protocol used exclusively by DJI, in "Drone Security and the Mysterious Case of DJI's DroneID," published in NDSS in 2023 [13]. As such, existing analysis tools for drones primarily focus on vulnerabilities in the communication protocols used by drones and are not applicable to firmware analysis.…”
Section: Drone Vulnerability Analysismentioning
confidence: 99%
“…Later, the author added features such as attacking 802.11 protocol targets and providing a gui to the existing DRAT, and released it through ICIEA in 2021 [12]. N Schiller designed and implemented a decoder that works with DUML, a proprietary tracking protocol used exclusively by DJI, in "Drone Security and the Mysterious Case of DJI's DroneID," published in NDSS in 2023 [13]. As such, existing analysis tools for drones primarily focus on vulnerabilities in the communication protocols used by drones and are not applicable to firmware analysis.…”
Section: Drone Vulnerability Analysismentioning
confidence: 99%