{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:11:00Z","timestamp":1759176660332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Robert Bosch Centre for Cyberphysical Systems, Department of Science and Technology - Government of India","award":["DSTO1782"],"award-info":[{"award-number":["DSTO1782"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3301293.3302370","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"27-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Regulating Drones in Restricted Spaces"],"prefix":"10.1145","author":[{"given":"Abhishek","family":"Vijeev","sequence":"first","affiliation":[{"name":"Indian Institute of Science Bangalore, Bangalore, India"}]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Science Bangalore, Bangalore, India"}]},{"given":"Chiranjib","family":"Bhattacharyya","sequence":"additional","affiliation":[{"name":"Indian Institute of Science Bangalore, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FlytOS: Operating system for drones. https:\/\/flytbase.com\/flytos\/.  FlytOS: Operating system for drones. https:\/\/flytbase.com\/flytos\/."},{"key":"e_1_3_2_1_2_1","unstructured":"MAVROS -- MAVLink extendable communication node for ROS with proxy for ground control station. http:\/\/wiki.ros.org\/mavros.  MAVROS -- MAVLink extendable communication node for ROS with proxy for ground control station. http:\/\/wiki.ros.org\/mavros."},{"volume-title":"Congress. FAA Modernization and Reform Act of 2012","year":"2012","key":"e_1_3_2_1_3_1","unstructured":"112th Congress. FAA Modernization and Reform Act of 2012 , February 2012 . https:\/\/www.congress.gov\/112\/plaws\/publ95\/PLAW-112publ95.pdf. 112th Congress. FAA Modernization and Reform Act of 2012, February 2012. https:\/\/www.congress.gov\/112\/plaws\/publ95\/PLAW-112publ95.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"ARM Limited","author":"Security ARM.","year":"2009","unstructured":"ARM. Security technology building a secure system using TrustZone technology (white paper) . ARM Limited , 2009 . ARM. Security technology building a secure system using TrustZone technology (white paper). ARM Limited, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906390"},{"key":"e_1_3_2_1_7_1","volume-title":"Information and Privacy Commissioner of Ontario","author":"Cavoukian A.","year":"2012","unstructured":"A. Cavoukian . Privacy and drones: Unmanned aerial vehicles . Information and Privacy Commissioner of Ontario , Canada Ontario , 2012 . A. Cavoukian. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Canada Ontario, 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"March","author":"Civil Aviations","year":"2015","unstructured":"Civil Aviations Authority (CAA). CAP 722 , Unmanned Aircraft System Operations in UK Airspace - Guidance , March 2015 . https:\/\/publicapps.caa.co.uk\/docs\/33\/CAP%20722%20Sixth%20Edition%20March%202015.pdf. Civil Aviations Authority (CAA). CAP 722, Unmanned Aircraft System Operations in UK Airspace - Guidance, March 2015. https:\/\/publicapps.caa.co.uk\/docs\/33\/CAP%20722%20Sixth%20Edition%20March%202015.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2017.09.017"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759659"},{"key":"e_1_3_2_1_11_1","volume-title":"August","author":"Civil Aviation Directorate General","year":"2018","unstructured":"Directorate General of Civil Aviation . Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAs) , August 2018 . http:\/\/dgca.nic.in\/cars\/D3X-X1.pdf. Directorate General of Civil Aviation. Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAs), August 2018. http:\/\/dgca.nic.in\/cars\/D3X-X1.pdf."},{"key":"e_1_3_2_1_12_1","volume-title":"ACM\/USENIX Symposium on Operating System Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B-C. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. Sheth . Taintdroid: An information-flow tracking system for Realtime privacy monitoring on smartphones . In ACM\/USENIX Symposium on Operating System Design and Implementation , 2010 . W. Enck, P. Gilbert, B-C. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for Realtime privacy monitoring on smartphones. In ACM\/USENIX Symposium on Operating System Design and Implementation, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"June","author":"Federal Aviation Administration (FAA).","year":"2016","unstructured":"Federal Aviation Administration (FAA). Small Unmanned Aircraft Systems (sUAS) , June 2016 . https:\/\/www.faa.gov\/documentLibrary\/media\/Advisory_Circular\/AC_107--2.pdf. Federal Aviation Administration (FAA). Small Unmanned Aircraft Systems (sUAS), June 2016. https:\/\/www.faa.gov\/documentLibrary\/media\/Advisory_Circular\/AC_107--2.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE International Conference on Cyber Conflict","author":"Hartmann K.","year":"2013","unstructured":"K. Hartmann and C. Steup . The vulnerability of UAVs to cyber attacks-an approach to the risk assessment . In IEEE International Conference on Cyber Conflict , 2013 . K. Hartmann and C. Steup. The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In IEEE International Conference on Cyber Conflict, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_17_1","volume-title":"August","author":"Koettl C.","year":"2018","unstructured":"C. Koettl and B. Marcolini . A closer look at the drone attack on Maduro in Venezuela , August 2018 . https:\/\/www.nytimes.com\/2018\/08\/10\/world\/americas\/venezuela-video-analysis.html. C. Koettl and B. Marcolini. A closer look at the drone attack on Maduro in Venezuela, August 2018. https:\/\/www.nytimes.com\/2018\/08\/10\/world\/americas\/venezuela-video-analysis.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086439.3086443"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00086"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016189"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium","author":"Nadkarni A.","year":"2017","unstructured":"A. Nadkarni , B. Andow , W. Enck , and S. Jha . Practical DIFC enforcement on Android . In USENIX Security Symposium , 2017 . A. Nadkarni, B. Andow, W. Enck, and S. Jha. Practical DIFC enforcement on Android. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_23_1","volume-title":"Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications","author":"Pleban J-S.","year":"2014","unstructured":"J-S. Pleban , R. Band , and R. Creutzburg . Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy . In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014 , volume 9030 , 2014. J-S. Pleban, R. Band, and R. Creutzburg. Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, volume 9030, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"ICRA workshop on open source software","author":"Quigley M.","year":"2009","unstructured":"M. Quigley , K. Conley , B. Gerkey , J. Faust , T. Foote , J. Leibs , R. Wheeler , and A. Y. Ng . ROS: An open-source Robot Operating System . In ICRA workshop on open source software , 2009 . M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, and A. Y. Ng. ROS: An open-source Robot Operating System. In ICRA workshop on open source software, 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"Robot Operating System Market - Snaphshot","author":"Research Transparency Market","year":"2018","unstructured":"Transparency Market Research . Robot Operating System Market - Snaphshot , 2018 . https:\/\/www.transparencymarketresearch.com\/robot-operating-system-market.html. Transparency Market Research. Robot Operating System Market - Snaphshot, 2018. https:\/\/www.transparencymarketresearch.com\/robot-operating-system-market.html."},{"key":"e_1_3_2_1_26_1","first-page":"5","author":"Rodr'iguez-Lera F. J.","year":"2018","unstructured":"F. J. Rodr'iguez-Lera , V. Matell\u00e1n-Olivera , J. Balsa-Comer\u00f3n , \u00c1- M. Guerrero-Higueras , and C. Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT , 5 , 2018 . F. J. Rodr'iguez-Lera, V. Matell\u00e1n-Olivera, J. Balsa-Comer\u00f3n, \u00c1-M. Guerrero-Higueras, and C. Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT, 5, 2018.","journal-title":"Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In USENIX Security Symposium , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935629"},{"key":"e_1_3_2_1_29_1","volume-title":"Radionavigation Laboratory Conference Proceedings","author":"Shepard D. P.","year":"2012","unstructured":"D. P. Shepard , J. A. Bhatti , T. E. Humphreys , and A. A. Fansler . Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks . In Radionavigation Laboratory Conference Proceedings , 2012 . D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Radionavigation Laboratory Conference Proceedings, 2012."},{"key":"e_1_3_2_1_30_1","volume-title":"Uluaug acc . Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International Wireless Communications and Mobile computing Conference","author":"Vattapparamban E.","year":"2016","unstructured":"E. Vattapparamban , . I. G\u00fcvencc , A. .I Yurekli , K. Akkaya , and S. Uluaug acc . Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International Wireless Communications and Mobile computing Conference , 2016 . E. Vattapparamban, .I. G\u00fcvencc, A. .I Yurekli, K. Akkaya, and S. Uluaug acc . Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International Wireless Communications and Mobile computing Conference, 2016."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684069"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91590-6_11"},{"key":"e_1_3_2_1_33_1","volume-title":"SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv preprint arXiv:1611.07060","author":"White R.","year":"2016","unstructured":"R. White , D. Christensen , I. Henrik , and D. Quigley . SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv preprint arXiv:1611.07060 , 2016 . R. White, D. Christensen, I. Henrik, and D. Quigley. SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv preprint arXiv:1611.07060, 2016."},{"key":"e_1_3_2_1_34_1","volume-title":"Passenger jet carrying 240 people nearly hits a drone at 15,000ft","author":"Young A.","year":"2018","unstructured":"A. Young . Passenger jet carrying 240 people nearly hits a drone at 15,000ft , 2018 . https:\/\/www.dailymail.co.uk\/news\/article-6172229\/Passenger-jet-carrying-240-people-nearly-hits-drone-15-000ft.html. A. Young. Passenger jet carrying 240 people nearly hits a drone at 15,000ft, 2018. https:\/\/www.dailymail.co.uk\/news\/article-6172229\/Passenger-jet-carrying-240-people-nearly-hits-drone-15-000ft.html."}],"event":{"name":"HotMobile '19: The 20th International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Santa Cruz CA USA","acronym":"HotMobile '19"},"container-title":["Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302370","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301293.3302370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":34,"alternative-id":["10.1145\/3301293.3302370","10.1145\/3301293"],"URL":"https:\/\/doi.org\/10.1145\/3301293.3302370","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}