2017 2nd International Conference on Multimedia and Image Processing (ICMIP) 2017
DOI: 10.1109/icmip.2017.30
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering for UAV Control Protocol Based on Detection Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Similarly, SkyJack [82] is a malicious software that, once implanted in a rogue drone, can wirelessly carry out authentication attacks via Wi-Fi to gain control of other drones and compromise the entire system. c) Reverse engineering: By reverse engineering UAV software, intruders may develop exploits to endanger the security, confidentiality, and integrity of UAVs [83]. They could also undermine trust in UAV technology and its applications.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…Similarly, SkyJack [82] is a malicious software that, once implanted in a rogue drone, can wirelessly carry out authentication attacks via Wi-Fi to gain control of other drones and compromise the entire system. c) Reverse engineering: By reverse engineering UAV software, intruders may develop exploits to endanger the security, confidentiality, and integrity of UAVs [83]. They could also undermine trust in UAV technology and its applications.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…[50] e.g. reverse engineering [56] Hiding sensitive parts of the code (obfuscation) and steganography (the practice of concealing information within non-secret data) [57], file encryption [58], removing some key parts of the code from the main program and secure them with high level of protection.…”
mentioning
confidence: 99%