{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T18:01:42Z","timestamp":1774029702311,"version":"3.50.1"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T00:00:00Z","timestamp":1554768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nano UAV Intelligence Systems Research Laboratory at Kwangwoon University"},{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"<jats:p>\n            The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of their autopilot technology. Unfortunately, terrorists have also begun to use consumer drones for kamikaze bombing and reconnaissance. To protect against such threats, several companies have started \u201canti-drone\u201d services that primarily focus on disrupting or incapacitating drone operations. However, the approaches employed are inadequate, because they make any drone that has intruded stop and remain over the protected area. We specify this issue by introducing the concept of\n            <jats:italic>safe-hijacking<\/jats:italic>\n            , which enables a hijacker to expel the intruding drone from the protected area remotely. As a\n            <jats:italic>safe-hijacking<\/jats:italic>\n            strategy, we investigated whether consumer drones in the autopilot mode can be hijacked via adaptive GPS spoofing. Specifically, as consumer drones activate GPS fail-safe and change their flight mode whenever a GPS error occurs, we performed black- and white-box analyses of GPS fail-safe flight mode and the following behavior after GPS signal recovery of existing consumer drones. Based on our analyses results, we developed a taxonomy of consumer drones according to these fail-safe mechanisms and designed\n            <jats:italic>safe-hijacking<\/jats:italic>\n            strategies for each drone type. Subsequently, we applied these strategies to four popular drones: DJI Phantom 3 Standard, DJI Phantom 4, Parrot Bebop 2, and 3DR Solo. The results of field experiments and software simulations verified the efficacy of our\n            <jats:italic>safe-hijacking<\/jats:italic>\n            strategies against these drones and demonstrated that the strategies can force them to move in any direction with high accuracy.\n          <\/jats:p>","DOI":"10.1145\/3309735","type":"journal-article","created":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T19:55:16Z","timestamp":1554926116000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Tractor Beam"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6730-1893","authenticated-orcid":false,"given":"Juhwan","family":"Noh","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"given":"Yujin","family":"Kwon","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"given":"Yunmok","family":"Son","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"given":"Hocheol","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"given":"Dohyun","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"given":"Jaeyeong","family":"Choi","sequence":"additional","affiliation":[{"name":"TmaxData, Gyeonggi-do, Republic of Korea"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,4,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"3DR. 2018. 3DR Solo Drone. Retrieved from https:\/\/3dr.com\/solo-drone\/.  3DR. 2018. 3DR Solo Drone. Retrieved from https:\/\/3dr.com\/solo-drone\/."},{"key":"e_1_2_1_2_1","unstructured":"ArduPilot Dev Team. 2019. Copter Home\u2014Copter documentation. Retrieved from http:\/\/ardupilot.org\/copter\/.  ArduPilot Dev Team. 2019. Copter Home\u2014Copter documentation. Retrieved from http:\/\/ardupilot.org\/copter\/."},{"key":"e_1_2_1_3_1","unstructured":"Battelle Memorial Institute. 2018. Counter-UAS technologies. Retrieved from https:\/\/www.battelle.org\/government-offerings\/national-security\/aerospace-systems\/counter-UAS-technologies.  Battelle Memorial Institute. 2018. Counter-UAS technologies. Retrieved from https:\/\/www.battelle.org\/government-offerings\/national-security\/aerospace-systems\/counter-UAS-technologies."},{"key":"e_1_2_1_4_1","unstructured":"BBC. 2015. Japan radioactive drone: Tokyo police arrest man. Retrieved from http:\/\/www.bbc.com\/news\/world-asia-32465624.  BBC. 2015. Japan radioactive drone: Tokyo police arrest man. Retrieved from http:\/\/www.bbc.com\/news\/world-asia-32465624."},{"key":"e_1_2_1_5_1","unstructured":"BBC. 2017. Drone causes Gatwick airport disruption. Retrieved from https:\/\/www.bbc.com\/news\/amp\/uk-40476264.  BBC. 2017. Drone causes Gatwick airport disruption. Retrieved from https:\/\/www.bbc.com\/news\/amp\/uk-40476264."},{"key":"e_1_2_1_6_1","volume-title":"A Software-Defined GPS and Galileo Receiver: A Single-Frequency Approach","author":"Borre Kai","unstructured":"Kai Borre , Dennis M. Akos , Nicolaj Bertelsen , Peter Rinder , and S\u00f8ren Holdt Jensen . 2007. A Software-Defined GPS and Galileo Receiver: A Single-Frequency Approach . Birkh\u00e4user , New York, NY . Kai Borre, Dennis M. Akos, Nicolaj Bertelsen, Peter Rinder, and S\u00f8ren Holdt Jensen. 2007. A Software-Defined GPS and Galileo Receiver: A Single-Frequency Approach. Birkh\u00e4user, New York, NY."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406948"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433205"},{"key":"e_1_2_1_9_1","unstructured":"James R. Clynch. 2006. Geodetic coordinate conversions I. Retrieved from https:\/\/www.oc.nps.edu\/oc2902w\/coord\/coordcvt.pdf.  James R. Clynch. 2006. Geodetic coordinate conversions I. Retrieved from https:\/\/www.oc.nps.edu\/oc2902w\/coord\/coordcvt.pdf."},{"key":"e_1_2_1_10_1","unstructured":"CNN. 2019. Dubai airport temporarily halts flights due to \u201cdrone activity.\u201d Retrieved from https:\/\/edition.cnn.com\/2019\/02\/15\/middleeast\/dubai-airport-drone-intl\/index.html.  CNN. 2019. Dubai airport temporarily halts flights due to \u201cdrone activity.\u201d Retrieved from https:\/\/edition.cnn.com\/2019\/02\/15\/middleeast\/dubai-airport-drone-intl\/index.html."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.807557"},{"key":"e_1_2_1_12_1","unstructured":"Dedrone. 2018. DroneTracker now features an integrated jammer. Retrieved from https:\/\/www.dedrone.com\/press\/dronetracker-now-features-an-integrated-jammer.  Dedrone. 2018. DroneTracker now features an integrated jammer. Retrieved from https:\/\/www.dedrone.com\/press\/dronetracker-now-features-an-integrated-jammer."},{"key":"e_1_2_1_13_1","unstructured":"Dedrone. 2018. DroneTracker software. Retrieved from https:\/\/www.dedrone.com\/products\/software.  Dedrone. 2018. DroneTracker software. Retrieved from https:\/\/www.dedrone.com\/products\/software."},{"key":"e_1_2_1_14_1","unstructured":"Dedrone. 2018. Event kit overview. Retrieved from https:\/\/www.dedrone.com\/products\/hardware\/event-kit\/event-kit-overview.  Dedrone. 2018. Event kit overview. Retrieved from https:\/\/www.dedrone.com\/products\/hardware\/event-kit\/event-kit-overview."},{"key":"e_1_2_1_15_1","unstructured":"DJI. 2015. Phantom 3 Standard User Manual. Retrieved from http:\/\/dl.djicdn.com\/downloads\/phantom_3_standard\/en\/Phantom_3_Standard_User_Manual__V1.4.pdf.  DJI. 2015. Phantom 3 Standard User Manual. Retrieved from http:\/\/dl.djicdn.com\/downloads\/phantom_3_standard\/en\/Phantom_3_Standard_User_Manual__V1.4.pdf."},{"key":"e_1_2_1_16_1","unstructured":"DJI. 2016. Phantom 4 User Manual. Retrieved from https:\/\/dl.djicdn.com\/downloads\/phantom_4\/en\/Phantom_4_User_Manual_en_v1.0.pdf.  DJI. 2016. Phantom 4 User Manual. Retrieved from https:\/\/dl.djicdn.com\/downloads\/phantom_4\/en\/Phantom_4_User_Manual_en_v1.0.pdf."},{"key":"e_1_2_1_17_1","unstructured":"DJI. 2017. DJI and UNDP use latest drone technology to protect vulnerable communities. Retrieved from http:\/\/citizenship.dji.com\/humanitarian\/dji-and-undp-use-latest-drone-technology-to-protect-vulnerable-communities.  DJI. 2017. DJI and UNDP use latest drone technology to protect vulnerable communities. Retrieved from http:\/\/citizenship.dji.com\/humanitarian\/dji-and-undp-use-latest-drone-technology-to-protect-vulnerable-communities."},{"key":"e_1_2_1_18_1","unstructured":"DJI. 2019. Phantom 3 Standard\u2014Drone for beginners. Retrieved from https:\/\/www.dji.com\/phantom-3-standard.  DJI. 2019. Phantom 3 Standard\u2014Drone for beginners. Retrieved from https:\/\/www.dji.com\/phantom-3-standard."},{"key":"e_1_2_1_19_1","unstructured":"DJI. 2019. Phantom 4\u2014DJI\u2019s smartest flying camera ever. Retrieved from https:\/\/www.dji.com\/phantom-4.  DJI. 2019. Phantom 4\u2014DJI\u2019s smartest flying camera ever. Retrieved from https:\/\/www.dji.com\/phantom-4."},{"key":"e_1_2_1_20_1","unstructured":"Drone Defence. 2019. NetGun X1 &verbar; short range drone protection. Retrieved from https:\/\/www.dronedefence.co.uk\/products\/netgun-x1.  Drone Defence. 2019. NetGun X1 &verbar; short range drone protection. Retrieved from https:\/\/www.dronedefence.co.uk\/products\/netgun-x1."},{"key":"e_1_2_1_21_1","unstructured":"DroneShield. 2018. DroneSentry. Retrieved from https:\/\/www.droneshield.com\/sentry\/.  DroneShield. 2018. DroneSentry. Retrieved from https:\/\/www.droneshield.com\/sentry\/."},{"key":"e_1_2_1_22_1","unstructured":"DroneShield. 2018. DroneShield. Retrieved from https:\/\/www.droneshield.com\/.  DroneShield. 2018. DroneShield. Retrieved from https:\/\/www.droneshield.com\/."},{"key":"e_1_2_1_23_1","unstructured":"DroneShield. 2018. How DroneShield works. Retrieved from https:\/\/www.droneshield.com\/how-droneshield-works\/.  DroneShield. 2018. How DroneShield works. Retrieved from https:\/\/www.droneshield.com\/how-droneshield-works\/."},{"key":"e_1_2_1_24_1","volume-title":"\u201cSilent Hunter","author":"Newspapers Express","unstructured":"Express Newspapers . 2017. Laser weapon called the \u201cSilent Hunter \u201d that can slice MISSILES unveiled by China. Retrieved from https:\/\/www.express.co.uk\/news\/uk\/774268\/Defence-China-US-Laser-Weapon-Tank-Slicing-Defence-Abu-Dhabi. Express Newspapers. 2017. Laser weapon called the \u201cSilent Hunter\u201d that can slice MISSILES unveiled by China. Retrieved from https:\/\/www.express.co.uk\/news\/uk\/774268\/Defence-China-US-Laser-Weapon-Tank-Slicing-Defence-Abu-Dhabi."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5194\/nhess-18-3085-2018"},{"key":"e_1_2_1_26_1","unstructured":"GIS Lounge. 2015. Use of drones in GIS. Retrieved from https:\/\/www.gislounge.com\/use-drones-gis\/.  GIS Lounge. 2015. Use of drones in GIS. Retrieved from https:\/\/www.gislounge.com\/use-drones-gis\/."},{"key":"e_1_2_1_27_1","unstructured":"Lin Huang and Qing Yang. 2015. Low-cost GPS Simulator - GPS Spoofing by SDR. https:\/\/media.defcon.org\/DEF%20CON%2023\/DEF%20CON%2023%20presentations\/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf  Lin Huang and Qing Yang. 2015. Low-cost GPS Simulator - GPS Spoofing by SDR. https:\/\/media.defcon.org\/DEF%20CON%2023\/DEF%20CON%2023%20presentations\/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the ION GNSS International Technical Meeting of the Satellite Division","volume":"55","author":"Humphreys Todd E.","unstructured":"Todd E. Humphreys , Brent M. Ledvina , Mark L. Psiaki , Brady W. O\u2019Hanlon , and Paul M . Kintner Jr. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer . In Proceedings of the ION GNSS International Technical Meeting of the Satellite Division , Vol. 55 . ION, Manassas, VA, 2314--2325. Todd E. Humphreys, Brent M. Ledvina, Mark L. Psiaki, Brady W. O\u2019Hanlon, and Paul M. Kintner Jr. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the ION GNSS International Technical Meeting of the Satellite Division, Vol. 55. ION, Manassas, VA, 2314--2325."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"},{"key":"e_1_2_1_30_1","unstructured":"Jammerall. 2019. Portable 30 meter 6 Antenna GPS L1 L2 L3 L4 L5 Glonass all bands GPS signal jammer and Lojack WiFi jammer. Retrieved from http:\/\/www.jammerall.com\/products\/Portable-30-meters-6-Antenna-GPS-L1-L2-L3-L4-L5-Glonass-All-Bands-GPS-Signal-Jammer-%26-Lojack-WiFi-Jammer.html.  Jammerall. 2019. Portable 30 meter 6 Antenna GPS L1 L2 L3 L4 L5 Glonass all bands GPS signal jammer and Lojack WiFi jammer. Retrieved from http:\/\/www.jammerall.com\/products\/Portable-30-meters-6-Antenna-GPS-L1-L2-L3-L4-L5-Glonass-All-Bands-GPS-Signal-Jammer-%26-Lojack-WiFi-Jammer.html."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_2_1_32_1","unstructured":"Aaron Luo. 2016. Drones Hijacking - Multi-dimensional Attack Vectors and Countermeasures. https:\/\/media.defcon.org\/DEF%20CON%2024\/DEF%20CON%2024%20presentations\/DEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf  Aaron Luo. 2016. Drones Hijacking - Multi-dimensional Attack Vectors and Countermeasures. https:\/\/media.defcon.org\/DEF%20CON%2024\/DEF%20CON%2024%20presentations\/DEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2005.853461"},{"key":"e_1_2_1_34_1","volume-title":"Anti-drone Market worth 1.14 Billion USD by","author":"Research MarketsandMarkets","year":"2022","unstructured":"MarketsandMarkets Research . 2016. Anti-drone Market worth 1.14 Billion USD by 2022 . Retrieved from http:\/\/www.marketsandmarkets.com\/PressReleases\/anti-drone.asp. MarketsandMarkets Research. 2016. Anti-drone Market worth 1.14 Billion USD by 2022. Retrieved from http:\/\/www.marketsandmarkets.com\/PressReleases\/anti-drone.asp."},{"key":"e_1_2_1_35_1","unstructured":"My Security Media. 2018. 70 Australian-made DroneGun Tactical anti-drone devices sold to middle Eastern Country. Retrieved from http:\/\/drasticnews.com\/70-australian-made-dronegun-tactical-anti-drone-devices-sold-to-middle-eastern-country\/.  My Security Media. 2018. 70 Australian-made DroneGun Tactical anti-drone devices sold to middle Eastern Country. Retrieved from http:\/\/drasticnews.com\/70-australian-made-dronegun-tactical-anti-drone-devices-sold-to-middle-eastern-country\/."},{"key":"e_1_2_1_36_1","unstructured":"OpenWorks Engineering. 2018. SkyWall. Retrieved from https:\/\/openworksengineering.com\/skywall.  OpenWorks Engineering. 2018. SkyWall. Retrieved from https:\/\/openworksengineering.com\/skywall."},{"key":"e_1_2_1_37_1","unstructured":"Orolia. 2017. GPS and GNSS satellite simulators\u2014GSG series. Retrieved from https:\/\/www.orolia.com\/products-services\/gnss-simulation\/gpsgnss-simulators.  Orolia. 2017. GPS and GNSS satellite simulators\u2014GSG series. Retrieved from https:\/\/www.orolia.com\/products-services\/gnss-simulation\/gpsgnss-simulators."},{"key":"e_1_2_1_38_1","unstructured":"Paparazzi Autopilot Team. 2017. Paparazzi is a free and open-source hardware and software project for unmanned (air) vehicles. Retrieved from https:\/\/github.com\/paparazzi\/paparazzi.  Paparazzi Autopilot Team. 2017. Paparazzi is a free and open-source hardware and software project for unmanned (air) vehicles. Retrieved from https:\/\/github.com\/paparazzi\/paparazzi."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.28957"},{"key":"e_1_2_1_40_1","unstructured":"Parrot. 2016. Parrot Bebop 2 Drone User Guide. Retrieved from https:\/\/parrotcontact.parrot.com\/website\/user-guides\/download-user-guides.php?pdf&equals;bebop-2\/Bebop-2_User-guide_UK.pdf.  Parrot. 2016. Parrot Bebop 2 Drone User Guide. Retrieved from https:\/\/parrotcontact.parrot.com\/website\/user-guides\/download-user-guides.php?pdf&equals;bebop-2\/Bebop-2_User-guide_UK.pdf."},{"key":"e_1_2_1_41_1","unstructured":"Parrot. 2019. Parrot Bebop 2 drone. Retrieved from https:\/\/www.parrot.com\/us\/drones\/parrot-bebop-2.  Parrot. 2019. Parrot Bebop 2 drone. Retrieved from https:\/\/www.parrot.com\/us\/drones\/parrot-bebop-2."},{"key":"e_1_2_1_42_1","unstructured":"PTS. 2015. F\u00f6rbud mot st\u00f6rs\u00e4ndare. Retrieved from https:\/\/pts.se\/sv\/privat\/radio\/utrustning\/forbud-mot-storsandare.  PTS. 2015. F\u00f6rbud mot st\u00f6rs\u00e4ndare. Retrieved from https:\/\/pts.se\/sv\/privat\/radio\/utrustning\/forbud-mot-storsandare."},{"key":"e_1_2_1_43_1","unstructured":"RACELOGIC. 2018. Labsat 3 GPS Simulator. Retrieved from https:\/\/www.labsat.co.uk\/index.php\/en\/products\/labsat-3.  RACELOGIC. 2018. Labsat 3 GPS Simulator. Retrieved from https:\/\/www.labsat.co.uk\/index.php\/en\/products\/labsat-3."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"e_1_2_1_45_1","unstructured":"Reuters. 2016. Dubai airport shuts airspace for nearly 30 mins due to drone activity. Retrieved from https:\/\/www.reuters.com\/article\/us-emirates-dubai-airport-drone-idUSKCN11Y0TY.  Reuters. 2016. Dubai airport shuts airspace for nearly 30 mins due to drone activity. Retrieved from https:\/\/www.reuters.com\/article\/us-emirates-dubai-airport-drone-idUSKCN11Y0TY."},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the SPIE","volume":"8301","author":"Samland Fred","year":"2012","unstructured":"Fred Samland , Jana Fruth , Mario Hildebrandt , Tobias Hoppe , and Jana Dittmann . 2012 . AR. drone: Security threat analysis and exemplary attack to track persons . In Proceedings of the SPIE , Vol. 8301 . SPIE, Bellingham, WA, 1--15. Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, and Jana Dittmann. 2012. AR. drone: Security threat analysis and exemplary attack to track persons. In Proceedings of the SPIE, Vol. 8301. SPIE, Bellingham, WA, 1--15."},{"key":"e_1_2_1_47_1","unstructured":"Singapore Press. 2017. Drones disrupt over 240 flights in Chongqing. Retrieved from https:\/\/www.straitstimes.com\/asia\/east-asia\/drones-disrupt-over-240-flights-in-chongqing.  Singapore Press. 2017. Drones disrupt over 240 flights in Chongqing. Retrieved from https:\/\/www.straitstimes.com\/asia\/east-asia\/drones-disrupt-over-240-flights-in-chongqing."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831199"},{"key":"e_1_2_1_49_1","unstructured":"Spirent. 2018. GSS7000 Series. Multi-GNSS multi-frequency constellation simulators. Retrieved from https:\/\/www.spirent.com\/Products\/GSS7000.  Spirent. 2018. GSS7000 Series. Multi-GNSS multi-frequency constellation simulators. Retrieved from https:\/\/www.spirent.com\/Products\/GSS7000."},{"key":"e_1_2_1_50_1","unstructured":"Stuff. 2018. Drone scare delays Auckland Airport flights turns out to be balloon. Retrieved from https:\/\/www.stuff.co.nz\/travel\/travel-troubles\/103111136\/drone-scare-delays-auckland-airport-flights-turns-out-to-be-balloon.  Stuff. 2018. Drone scare delays Auckland Airport flights turns out to be balloon. Retrieved from https:\/\/www.stuff.co.nz\/travel\/travel-troubles\/103111136\/drone-scare-delays-auckland-airport-flights-turns-out-to-be-balloon."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2013.2287568"},{"key":"e_1_2_1_52_1","unstructured":"Takuji Ebinuma. 2018. Software-defined GPS signal simulator. Retrieved from https:\/\/github.com\/osqzss\/gps-sdr-sim.  Takuji Ebinuma. 2018. Software-defined GPS signal simulator. Retrieved from https:\/\/github.com\/osqzss\/gps-sdr-sim."},{"key":"e_1_2_1_53_1","unstructured":"The New York Times. 2016. Pentagon confronts a new threat from ISIS: Exploding drones. Retrieved from https:\/\/www.nytimes.com\/2016\/10\/12\/world\/middleeast\/iraq-drones-isis.html?_r&equals;0.  The New York Times. 2016. Pentagon confronts a new threat from ISIS: Exploding drones. Retrieved from https:\/\/www.nytimes.com\/2016\/10\/12\/world\/middleeast\/iraq-drones-isis.html?_r&equals;0."},{"key":"e_1_2_1_54_1","unstructured":"The Washington Post. 2009. Local police want right to jam wireless signals. Retrieved from http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/01\/31\/AR2009013101548.html?noredirect&equals;on.  The Washington Post. 2009. Local police want right to jam wireless signals. Retrieved from http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/01\/31\/AR2009013101548.html?noredirect&equals;on."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_2_1_56_1","unstructured":"u-blox. 2014. NEO-7 U-blox 7 GNSS modules Data Sheet. Retrieved from https:\/\/www.u-blox.com\/sites\/default\/files\/products\/documents\/NEO-7_DataSheet_%28UBX-13003830%29.pdf.  u-blox. 2014. NEO-7 U-blox 7 GNSS modules Data Sheet. Retrieved from https:\/\/www.u-blox.com\/sites\/default\/files\/products\/documents\/NEO-7_DataSheet_%28UBX-13003830%29.pdf."},{"key":"e_1_2_1_57_1","unstructured":"u-blox. 2017. NEO-7 series. Retrieved from https:\/\/www.u-blox.com\/en\/product\/neo-7-series.  u-blox. 2017. NEO-7 series. Retrieved from https:\/\/www.u-blox.com\/en\/product\/neo-7-series."},{"key":"e_1_2_1_58_1","unstructured":"UNA-UK. 2013. Noel Sharkey on drones and the threat of autonomous weapons. Retrieved from https:\/\/www.una.org.uk\/magazine\/spring-2013\/noel-sharkey-drones-and-threat-autonomous-weapons.  UNA-UK. 2013. Noel Sharkey on drones and the threat of autonomous weapons. Retrieved from https:\/\/www.una.org.uk\/magazine\/spring-2013\/noel-sharkey-drones-and-threat-autonomous-weapons."},{"key":"e_1_2_1_59_1","volume-title":"Icarus","author":"Media Verizon","year":"2016","unstructured":"Verizon Media . 2016. \u201c Icarus \u201d machine can commandeer a drone mid-flight. Retrieved from https:\/\/www.engadget.com\/ 2016 \/10\/28\/icarus-hijack-dmsx-drones\/. Verizon Media. 2016. \u201cIcarus\u201d machine can commandeer a drone mid-flight. Retrieved from https:\/\/www.engadget.com\/2016\/10\/28\/icarus-hijack-dmsx-drones\/."},{"key":"e_1_2_1_60_1","unstructured":"WIRED. 2015. Welcome to the world drone-killing laser cannon. Retrieved from https:\/\/www.wired.com\/2015\/08\/welcome-world-drone-killing-laser-cannon\/.  WIRED. 2015. Welcome to the world drone-killing laser cannon. Retrieved from https:\/\/www.wired.com\/2015\/08\/welcome-world-drone-killing-laser-cannon\/."},{"key":"e_1_2_1_61_1","unstructured":"WIRED. 2018. The explosive-carrying drones in Venezuela won\u2019t be the last. Retrieved from https:\/\/www.wired.com\/story\/venezuela-drones-explosives-maduro-threat\/.  WIRED. 2018. The explosive-carrying drones in Venezuela won\u2019t be the last. Retrieved from https:\/\/www.wired.com\/story\/venezuela-drones-explosives-maduro-threat\/."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627398"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:36Z","timestamp":1750204416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309735"}},"subtitle":["Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing"],"short-title":[],"issued":{"date-parts":[[2019,4,9]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3309735"],"URL":"https:\/\/doi.org\/10.1145\/3309735","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,9]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}