Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 1308045, 9 pages
https://doi.org/10.1155/2017/1308045
Research Article

Automatic Reverse Engineering of Private Flight Control Protocols of UAVs

College of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China

Correspondence should be addressed to Jian Wang; nc.ude.tdun@gnawj

Received 15 March 2017; Revised 14 May 2017; Accepted 29 May 2017; Published 4 July 2017

Academic Editor: Zheng Yan

Copyright © 2017 Ran Ji et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. A. Demir, H. Cicibas, and N. Arica, “Unmanned aerial vehicle domain: areas of research,” Defence Science Journal, vol. 65, no. 4, pp. 319–329, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. J.-S. Pleban, R. Band, and R. Creutzburg, “Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy,” in Proceedings of the IS & T/SPIE Electronic Imaging International Society for Optics and Photonics, San Francisco, Calif, USA, February 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. R. L. Finn and D. Wright, “Unmanned aircraft systems: surveillance, ethics and privacy in civil applications,” Computer Law and Security Review, vol. 28, no. 2, pp. 184–194, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Narayan, S. K. Shukla, and T. C. Clancy, “A survey of automatic protocol reverse engineering tools,” ACM Computing Surveys, vol. 48, no. 3, article 40, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Ying, L.-z. Gu, Z.-x. Li, and Y.-x. Yang, “Protocol reverse engineering through dynamic and static binary analysis,” Journal of China Universities of Posts & Telecommunications, vol. 20, 2, pp. 75–79, 2013. View at Google Scholar
  6. M.-M. Xiao, S.-L. Zhang, and Y.-P. Luo, “Automatic network protocol message format analysis,” Journal of Intelligent and Fuzzy Systems, vol. 31, no. 4, pp. 2271–2279, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Antunes, N. Neves, and P. Verissimo, “Reverse engineering of protocols from network traces,” in Proceedings of the 18th Working Conference on Reverse Engineering, WCRE 2011, pp. 169–178, irl, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Li and L. Chen, “A survey on methods of automatic protocol reverse engineering,” in Proceedings of the 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, pp. 685–689, chn, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Caballero, H. Yin, Z. Liang, and D. Song, “Polyglot: automatic extraction of protocol message format using dynamic binary analysis,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 317–329, ACM, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Caballero, P. Poosankam, C. Kreibich, and D. Song, “Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 621–634, ACM, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Beddoe, “Network protocol analysis using bioinformatics algorithms, 2009”.
  12. M. Shevertalov and S. Mancoridis, “A reverse engineering tool for extracting protocols of networked applications,” in Proceedings of the 14th Working Conference on Reverse Engineering, WCRE 2007, pp. 229–238, can, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, McGrawHill, 2nd edition, 2001. View at MathSciNet
  14. C. Weidong, J. Kannan, and H. J. Wang, “Discoverer: Automatic protocol reverse engineering from network traces, 2007”.
  15. S. Tao, H. Yu, and Q. Li, “Bit-oriented format extraction approach for automatic binary protocol reverse engineering,” IET Communications, vol. 10, no. 6, pp. 709–716, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. B.-C. Li and S.-Z. Yu, “Keyword Mining for Private Protocols Tunneled over WebSocket,” IEEE Communications Letters, vol. 20, no. 7, pp. 1337–1340, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. S.-Z. Yu, “Hidden semi-Markov models,” Artificial Intelligence, vol. 174, no. 2, pp. 215–243, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. G. Bossert, F. Guihéry, and G. Hiet, “Towards automated protocol reverse engineering using semantic information,” in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '14), pp. 51–62, 2014. View at Publisher · View at Google Scholar
  19. N. M. Rodday, R. O. De Schmidt, and A. Pras, “Exploring security vulnerabilities of unmanned aerial vehicles,” in Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, pp. 993-994, tur, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. qgroundcontrol.org. MAVLink Micro Air Vehicle Communication Protocol, 2017, http://qgroundcontrol.org/mavlink/startfrom.
  21. O. Maimon and L. Rokach, Data Mining and Knowledge Discovery Handbook, Springer, New York, NY, USA, 2005. View at Publisher · View at Google Scholar
  22. Wi-Fi Alliance. WIFI Direct, 2017, http://www.wi-fi.org/discover-wi-fi/wi-fi-direct. View at Publisher · View at Google Scholar
  23. wikipedia, org. Dictionary attack, 2017, https://en.wikipedia.org/wiki/Dictionary_attack.