Publication:
Vulnerability Analysis of Unmanned Aerial Vehicles with no Fly Zones

Дата
2021
Авторы
Losevskaya, E. GXXXXX.
Zareshin, S. V.
Firer, A. M.
Journal Title
Journal ISSN
Volume Title
Издатель
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Выпуск журнала
Аннотация
© 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.This article discusses the problem of overcoming areas prohibited by unmanned aerial vehicles by an unmanned aerial vehicle, namely, the study of quadrocopters firmware and software to identify forbidden zones in them and the possibility of bypassing them. The analysis of existing solutions in this area for quadrocopters of different companies and models that are banned from flying is carried out. The results of the analysis of existing methods for bypassing restricted areas based on which decisions are made to create new approaches to identifying this content in firmware or quadrocopter software are presented. Much attention is paid to the problem of protecting private property and property of enterprises that imposed a ban on flying quadrocopters. Also, the problem of protecting software companies that produce these devices from hacking. An experiment is described that was conducted to analyze the security of quadrocopter software to find places vulnerable to hacking and possible correction of restricted areas. During the experiment, production firmware with modified ones was analyzed and compared, in which the restricted areas were deleted, as a result of which a piece of code was found in the software that sets the restricted areas in the firmware. In the final part of the article, a set of methods is carried out that is supposed to be used in further developments to solve the problem of protection of restricted areas.
Описание
Ключевые слова
Цитирование
Losevskaya, E. GXXXXX. Vulnerability Analysis of Unmanned Aerial Vehicles with no Fly Zones / Losevskaya, E.G., Zareshin, S.V., Firer, A.M. // Lecture Notes in Electrical Engineering. - 2021. - 729 LNEE. - P. 675-684. - 10.1007/978-3-030-71119-1_66
Коллекции