{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T01:50:29Z","timestamp":1776304229002,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/ccwc.2019.8666464","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:58:55Z","timestamp":1552953535000},"page":"0666-0672","source":"Crossref","is-referenced-by-count":14,"title":["Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System"],"prefix":"10.1109","author":[{"given":"Ignacio","family":"Astaburuaga","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amee","family":"Lombardi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brian","family":"La Torre","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carolyn","family":"Hughes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Scapy","author":"biondi","year":"0"},{"key":"ref11","article-title":"How to Cross Compile C\/C++ application for AR Drone Hassan Nadeem","author":"nadeem","year":"2015"},{"key":"ref12","article-title":"NVD - Results","year":"0"},{"key":"ref13","author":"zelivansky","year":"2017","journal-title":"Busybox Shell Vulnerability CVE-2017-16544 Twistlock Alerts"},{"key":"ref14","article-title":"A Blast From the Past: Executing Code in Terminal Emulators via Escape Sequences - Protean Security","author":"lukan","year":"2014"},{"key":"ref15","article-title":"busybox - BusyBox: The Swiss Army Knife of Embedded Linux","author":"vlasenko","year":"2011"},{"key":"ref16","article-title":"Design of a pairing protocol for the AR.Drone 2.0","author":"bertels","year":"2016","journal-title":"M S thesis"},{"key":"ref17","article-title":"Ubuntu on AR.Drone 2.0 - drone-forum.com","year":"2013"},{"key":"ref18","author":"monajjemi","year":"2013","journal-title":"AutonomyLab\/ardrone autonomy"},{"key":"ref19","author":"araos","year":"2013","journal-title":"daraosn\/ardrone-wpa2"},{"key":"ref4","article-title":"AR Drone Motor Controller Tech Toy Hacks","year":"2011"},{"key":"ref3","article-title":"BusyBox","year":"0"},{"key":"ref6","article-title":"AR.Drone Developer Guide SDK 2.0","year":"0"},{"key":"ref5","article-title":"AR Drone 2\/AT Commands - PaparazziUAV","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.2044868"},{"key":"ref7","article-title":"felixge\/node-ar-drone","author":"geisendorfer","year":"0"},{"key":"ref2","article-title":"Drone Uses: The Awesome Benefits of Drone Technology","author":"brown","year":"0"},{"key":"ref1","article-title":"Fact Sheet Federal Aviation Administration (FAA) Forecast Fiscal Years (FY) 2017-2038","year":"0"},{"key":"ref9","article-title":"NVD - Results","year":"0"},{"key":"ref20","article-title":"Dropbear SSH","year":"0"},{"key":"ref22","article-title":"AR.Pwn: Hacking the Parrot AR.Drone (Part 1)","author":"rand","year":"0"},{"key":"ref21","article-title":"AR Drone program.elf Replacement Tech Toy Hacks","year":"2011"},{"key":"ref23","article-title":"AR.Pwn: Hacking the Parrot AR.Drone (Part 2)","author":"rand","year":"0"}],"event":{"name":"2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2019,1,7]]},"end":{"date-parts":[[2019,1,9]]}},"container-title":["2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8663971\/8666184\/08666464.pdf?arnumber=8666464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:37Z","timestamp":1658094517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2019.8666464","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}