1 |
M. robbinson, "Knocking my neighbors kids cruddy drone offline," Defcon 23, 2015.
|
2 |
B Nassi, A Shabtai, R Masuoka, Y Elovici. "Sok - security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps." ArXiv abs/1903.05155, 2019.
|
3 |
Daegeon Kim, Huy Kang Kim, "Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications," arXiv, 2019.
|
4 |
C. Hennebert, "A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms," 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-6, 2020, doi: 10.1109/IOTSMS52051.2020.9340216.
DOI
|
5 |
Ji-soo Park, Seung-joo Kim. "Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria". KIPS Transactions on Computer and Communication Systems, vol. 6, pp.121-134, 2017.
DOI
|
6 |
Shevchenko, Nataliya, "Threat Modeling: a Summary of Available Methods," Jul. 2018.
|
7 |
A. Shostack, "Threat Modeling: Designing for Security," Wiley, 2014.
|
8 |
R. Khan, K. McLaughlin, D. Laverty and S. Sezer, "STRIDE-based threat modeling for cyber-physical systems," 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), pp. 1-6, 2017, doi: 10.1109/ISGTEurope.2017.8260283.
DOI
|
9 |
In-Kyung Oh, Jae-Wan Seo, Min-Kyu Lee, Tae-Hoon Lee, Yu-Na Han, Ui-Seong Park, Han-Byeol Ji , Jong-Ho Lee, Kyu-Hyung Cho, Kyoung-gon Kim, "Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling," Journal of the Korea Institute of Information Security & Cryptology, vol. 30, no. 2, pp. 213-230, 2020.
DOI
|
10 |
R. Scandariato, K. Wuyts, W. Joosen, "A descriptive study of Microsoft's threat modeling technique," Requirements Engineering, vol. 20, no. 2, pp. 163-180, Jun. 2015.
DOI
|
11 |
Seung-hoon Park, "The CHAOS (ChibiOS based High Assurance Operating System) Project," https://github.com/HackProof/CHAOS
|
12 |
E.Deligne, "ARDrone corruption," Journal in Computer Virology, vol.8, no. 1-2, pp. 55-27, May. 2012.
DOI
|
13 |
A.J. Kerns, D.P. Shepard, A.B. Jahshan and T.E. Humphreys, "Unmanned Aircraft Capture and Control Via GPS Spoofing," Journal of Field Robotics vol. 31, pp. 617-636, 2014.
DOI
|
14 |
Seung bae Sim,Hun yeong Kwon, Ho sang Jung, "A study on Utilization of Drone for Public Sector by Analysis of Drone Industry," Journal of Information Technology Service, vol. 15, no. 4, pp. 25-39. Dec. 2016.
DOI
|
15 |
D. He, S. Chan and M. Guizani, "Drone-Assisted Public Safety Networks: The Security Aspect," in IEEE Communications Magazine, vol. 55, no. 8, pp. 218-223, Aug. 2017.
DOI
|
16 |
Korea Internet & Security Agency, Cyber security guide for drone, Dec. 2020.
|
17 |
N. Shevchenko, T.A. Chick, P. O'Riordan, T.P. Scanlon and C. Woody, "Threat Modeling: A Summary of Available Methods," AD1084024, Software Engineering Institute, Carnegie Melon University, Jul. 2018.
|
18 |
S. Myagmar, A.J. Lee and W. Yurcik, "Threat Modeling as a Basis for Security Requirements," National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, 2005.
|
19 |
S. Kamkar, "Skyjack," https://github.com/samyk/skyjack, Dec. 2013.
|
20 |
J. Yaacoub, H. Noura, O. Salman, A. Chehab, "Security analysis of drones systems: Attacks, limitations, and recommendations", Internet of Things, vol. 11, Sep. 2020.
|
21 |
I. Astaburuaga, A. Lombardi, B. La Torre, C. Hughes and S. Sengupta, "Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0666-0672, 2019.
|
22 |
N. M. Rodday, "Hacking a Professional Drone," blackhat asia, 2016.
|
23 |
A. Luo, "Drones hijacking - multi-dimensional attack vectors and countermeasures," Defcon 24, 2016.
|
24 |
K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos and P. Hurley, "An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture," 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 222-225, 2016, doi: 10.1109/DSN-W.2016.63.
DOI
|
25 |
Dae-geon Kim, "Security Enhancement of Drone Considering the Characteristics of Data Transmitted between Wireless Channel," Journal of Defense and Security, vol. 3, no. 1, pp. 51-70, 2021.
|
26 |
T. Trippel, O. Weisse, W. Xu, P. Honeyman and K. Fu, "WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks," 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, pp. 3-18, doi: 10.1109/EuroSP.2017.42.
DOI
|
27 |
C. Rani, H. Modares, R. Sriram, D. Mikulski, FL. Lewis, "Security of unmanned aerial vehicle systems against cyber-physical attacks", The Journal of Defense Modeling and Simulation, vol. 13, no. 3, pp. 331-342, 2016.
DOI
|
28 |
N. M. Rodday, R. d. O. Schmidt and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993-994, 2016, doi: 10.1109/NOMS.2016.7502939.
DOI
|
29 |
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O'Hanlon, P.M. Kintner and Jr, "Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer," Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS), Savannah, GA, pp. 2314-2325, Sep 2008.
|
30 |
A. Vervisch-Picois, N. Samama and T. Taillandier-Loize, "Influence of GNSS spoofing on drone in automatic flight mode, " International Symposium of Navigation and Timing 4th, Toulouse, France. pp. 1-9, Nov. 2017.
|
31 |
D. He et al., "A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles," in IEEE Network, vol. 33, no. 2, pp. 146-151, Apr. 2019, doi: 10.1109/MNET.2018.1800065.
DOI
|
32 |
Seong-Hun Seo, Byung-Hyun Lee, Sung-Hyuck Im, Gyu-In Jee, "Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal," Journal of Positioning, Navigation, and Timing, vol. 4, no. 2, pp. 57-65, June 2015.
DOI
|
33 |
J. Farlik, M. Kratky and J. Casar, "Detectability and jamming of small UAVs by commercially available low-cost means," 2016 International Conference on Communications (COMM), 2016, pp. 327-330, doi: 10.1109/ICComm.2016.7528287.
DOI
|
34 |
J. Gordon, V. Kraj, J. H. Hwang and A. Raja, "A Security Assessment for Consumer WiFi Drones," 2019 IEEE International Conference on Industrial Internet (ICII), 2019, pp. 1-5, doi: 10.1109/ICII.2019.00011.
DOI
|
35 |
Paul Hong, Yejun Kim, Kwangsoo Cho, Seungjoo Kim, "A study on Security Requirements for 5G Base Station", Journal of The Korea Institute of Information Security &Cryptology, vol. 31, no. 5, Oct. 2021.
|
36 |
Yun-mok Son, Ho-cheol Shin, Dong-kwan Kim, Young-seok Park, Ju-hwan Noh, Ki-bum Choi, Jung-woo Choi, and Yong-dae Kim, "Rocking drones with intentional sound noise on gyroscopic sensors," 24th USENIX Conference on Security Symposium(SEC'15), pp. 881-896, 2015.
|
37 |
B. Nassi, R. Bitton, R. Masuoka, A. Shabtai and Y. Elovici, "Sok: security and privacy in the age of commercial drones," 2021 IEEE Symp. on Security and Privacy (SP), pp. 1434-1451, 2021.
|