{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T23:08:56Z","timestamp":1777417736416,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009896","name":"U.S. Navy","doi-asserted-by":"publisher","award":["N00014-14-1-0717"],"award-info":[{"award-number":["N00014-14-1-0717"]}],"id":[{"id":"10.13039\/100009896","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 13-02563"],"award-info":[{"award-number":["CNS 13-02563"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3055004.3055010","type":"proceedings-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T12:27:28Z","timestamp":1491827248000},"page":"143-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["VirtualDrone"],"prefix":"10.1145","author":[{"given":"Man-Ki","family":"Yoon","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Naira","family":"Hovakimyan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ArduPilot Autopilot Suite. http:\/\/www.ardupilot.org  ArduPilot Autopilot Suite. http:\/\/www.ardupilot.org"},{"key":"e_1_3_2_1_2_1","unstructured":"Emlid NAVIO+. https:\/\/docs.emlid.com\/navio\/  Emlid NAVIO+. https:\/\/docs.emlid.com\/navio\/"},{"key":"e_1_3_2_1_3_1","unstructured":"LibVMI. http:\/\/libvmi.com\/  LibVMI. http:\/\/libvmi.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"QEMU. http:\/\/wiki.qemu.org  QEMU. http:\/\/wiki.qemu.org"},{"key":"e_1_3_2_1_5_1","unstructured":"Raspberry PI 2 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-2-model-b\/  Raspberry PI 2 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-2-model-b\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Cyber-attack concerns raised over Boeing 787 chip's 'back door'.The Guardian. https:\/\/www.theguardian.com\/technology\/2012\/may\/29\/cyber-attack-concerns-boeing-chip.  Cyber-attack concerns raised over Boeing 787 chip's 'back door'. The Guardian . https:\/\/www.theguardian.com\/technology\/2012\/may\/29\/cyber-attack-concerns-boeing-chip."},{"key":"e_1_3_2_1_7_1","unstructured":"3DR's Solo Drone Boasts Dual Linux Computers Running Dronecode. https:\/\/www.linux.com\/news\/3drs-solo-drone-boasts-dual-linux-computers-running\/dronecode  3DR's Solo Drone Boasts Dual Linux Computers Running Dronecode. https:\/\/www.linux.com\/news\/3drs-solo-drone-boasts-dual-linux-computers-running\/dronecode"},{"key":"e_1_3_2_1_8_1","unstructured":"A hacker developed Maldrone the first malware for drones. Security Affairs. http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html.  A hacker developed Maldrone the first malware for drones. Security Affairs . http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Hijacking drones with a MAVLink exploit. http:\/\/diydrones.com\/profiles\/blogs\/hijacking-quadcopters-with-a-mavlink-exploit.  Hijacking drones with a MAVLink exploit. http:\/\/diydrones.com\/profiles\/blogs\/hijacking-quadcopters-with-a-mavlink-exploit."},{"key":"e_1_3_2_1_10_1","unstructured":"Qualcomm Goes Ubuntu for Drone Reference Platform. https:\/\/www.linux.com\/news\/qualcomm-goes-ubuntu-drone-reference-platform  Qualcomm Goes Ubuntu for Drone Reference Platform. https:\/\/www.linux.com\/news\/qualcomm-goes-ubuntu-drone-reference-platform"},{"key":"e_1_3_2_1_11_1","unstructured":"Watch GPS Attacks That Can Kill DJI Drones Or Bypass White House Ban. Forbes. http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/08\/08\/qihoo-hacks-drone-gps\/#26431a2853fe.  Watch GPS Attacks That Can Kill DJI Drones Or Bypass White House Ban. Forbes . http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/08\/08\/qihoo-hacks-drone-gps\/#26431a2853fe."},{"key":"e_1_3_2_1_12_1","unstructured":"Intel Aero Compute Board. http:\/\/www.intel.com\/content\/www\/us\/en\/technology-innovation\/aerial-technology-overview.html  Intel Aero Compute Board. http:\/\/www.intel.com\/content\/www\/us\/en\/technology-innovation\/aerial-technology-overview.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_14_1","unstructured":"Tal Garfinkel and Mendel Rosenblum. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In the Network and Distributed systems Security Symposium.  Tal Garfinkel and Mendel Rosenblum. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In the Network and Distributed systems Security Symposium ."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_17_1","volume-title":"the USENIX Annual Technical Conference.","author":"Liu Jiuxing","unstructured":"Jiuxing Liu , Wei Huang , Bulent Abali , and Dhabaleswar K. Panda . 2006. High Performance VMM-bypass I\/O in Virtual Machines . In the USENIX Annual Technical Conference. Jiuxing Liu, Wei Huang, Bulent Abali, and Dhabaleswar K. Panda. 2006. High Performance VMM-bypass I\/O in Virtual Machines. In the USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2350231"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590299"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_23_1","unstructured":"Johann-Sebastian Pleban Ricardo Band and Reiner Creutzburg. 2014. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In the SPIE Mobile Devices and Multimedia: Enabling Technologies Algorithms and Applications.  Johann-Sebastian Pleban Ricardo Band and Reiner Creutzburg. 2014. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In the SPIE Mobile Devices and Multimedia: Enabling Technologies Algorithms and Applications ."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"e_1_3_2_1_25_1","volume-title":"the ACM Conference on Computer and Communications Security.","author":"Srinivasan Deepa","year":"2011","unstructured":"Deepa Srinivasan , Zhi Wang , Xuxian Jiang , and Dongyan Xu . 2011 . Process Outgrafting: An Efficient \"out-of-VM\" Approach for Fine-grained Process Execution Monitoring . In the ACM Conference on Computer and Communications Security. Deepa Srinivasan, Zhi Wang, Xuxian Jiang, and Dongyan Xu. 2011. Process Outgrafting: An Efficient \"out-of-VM\" Approach for Fine-grained Process Execution Monitoring. In the ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_27_1","volume-title":"the ACM\/IEEE International Conference on Cyber-Physical Systems.","author":"Wang X.","unstructured":"X. Wang , N. Hovakimyan , and L. Sha . 2013. L1Simplex: Fault-tolerant control of cyber-physical systems . In the ACM\/IEEE International Conference on Cyber-Physical Systems. X. Wang, N. Hovakimyan, and L. Sha. 2013. L1Simplex: Fault-tolerant control of cyber-physical systems. In the ACM\/IEEE International Conference on Cyber-Physical Systems."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.196"},{"key":"e_1_3_2_1_29_1","volume-title":"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In the ACM Conference on Computer and Communications Security.","author":"Yin Heng","year":"2007","unstructured":"Heng Yin , Dawn Song , Manuel Egele , Christopher Kruegel , and Engin Kirda . 2007 . Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In the ACM Conference on Computer and Communications Security. Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. 2007. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In the ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2928275.2928290"},{"key":"e_1_3_2_1_31_1","volume-title":"SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium.","author":"Yoon Man-Ki","year":"2013","unstructured":"Man-Ki Yoon , Sibin Mohan , Jaesik Choi , Jung-Eun Kim , and Lui Sha . 2013 . SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium. Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In the IEEE Real-Time Embedded Technology and Applications Symposium."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744869"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"}],"event":{"name":"ICCPS '17: ACM\/IEEE 8th International Conference on Cyber-Physical Systems","location":"Pittsburgh Pennsylvania","acronym":"ICCPS '17"},"container-title":["Proceedings of the 8th International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055004.3055010","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055004.3055010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:51Z","timestamp":1750217811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055010"}},"subtitle":["virtual sensing, actuation, and communication for attack-resilient unmanned aerial systems"],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":33,"alternative-id":["10.1145\/3055004.3055010","10.1145\/3055004"],"URL":"https:\/\/doi.org\/10.1145\/3055004.3055010","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}