{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:04:32Z","timestamp":1775469872155,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417858","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"181-194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Privaros: A Framework for Privacy-Compliant Delivery Drones"],"prefix":"10.1145","author":[{"given":"Rakesh Rajan","family":"Beck","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Abhishek","family":"Vijeev","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"2039","author":"United States Federal Aviation Administration. FAA Aerospace Forecast","year":"2019","unstructured":"United States Federal Aviation Administration. FAA Aerospace Forecast : Fiscal Years 2019 -- 2039 , 2019. https:\/\/www.faa.gov\/data_research\/aviation\/aerospace_forecasts\/media\/FY2019--39_FAA_Aerospace_Forecast.pdf. United States Federal Aviation Administration. FAA Aerospace Forecast: Fiscal Years 2019--2039, 2019. https:\/\/www.faa.gov\/data_research\/aviation\/aerospace_forecasts\/media\/FY2019--39_FAA_Aerospace_Forecast.pdf.","journal-title":"Fiscal Years"},{"key":"e_1_3_2_2_2_1","unstructured":"Apex AI. Performance Test. https:\/\/gitlab.com\/ApexAI\/performance_test\/.  Apex AI. Performance Test. https:\/\/gitlab.com\/ApexAI\/performance_test\/."},{"key":"e_1_3_2_2_3_1","unstructured":"AppArmor--an effective and easy-to-use Linux application security system. https:\/\/gitlab.com\/apparmor\/apparmor\/wikis\/home\/.  AppArmor--an effective and easy-to-use Linux application security system. https:\/\/gitlab.com\/apparmor\/apparmor\/wikis\/home\/."},{"key":"e_1_3_2_2_4_1","unstructured":"Ardupilot Autopilot Software. https:\/\/ardupilot.org\/.  Ardupilot Autopilot Software. https:\/\/ardupilot.org\/."},{"key":"e_1_3_2_2_5_1","volume-title":"ARM Limited","author":"Security ARM.","year":"2009","unstructured":"ARM. Security technology building a secure system using TrustZone technology (white paper) . ARM Limited , 2009 . https:\/\/static.docs.arm.com\/genc009492\/c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. ARM. Security technology building a secure system using TrustZone technology (white paper). ARM Limited, 2009. https:\/\/static.docs.arm.com\/genc009492\/c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf."},{"key":"e_1_3_2_2_6_1","unstructured":"United Kingdom-Civil Aviation Authority. The Drone and Model Aircraft Code--Protecting people's privacy. https:\/\/register-drones.caa.co.uk\/drone-code\/protecting-peoples-privacy.  United Kingdom-Civil Aviation Authority. The Drone and Model Aircraft Code--Protecting people's privacy. https:\/\/register-drones.caa.co.uk\/drone-code\/protecting-peoples-privacy."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_2_8_1","volume-title":"March","author":"Bell D. E.","year":"1976","unstructured":"D. E. Bell and L. LaPadula . Secure computer system: Unified exposition and Multics interpretation , March 1976 . Tech. Report MTR-2997, MITRE Corporation . D. E. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation, March 1976. Tech. Report MTR-2997, MITRE Corporation."},{"key":"e_1_3_2_2_9_1","volume-title":"The Brookings Institution--The Project on Civilian Robots","author":"Bennett W. C.","year":"2014","unstructured":"W. C. Bennett . Civilian drones, privacy, and the federal-state balance . In The Brookings Institution--The Project on Civilian Robots , September 2014 . https:\/\/www.brookings.edu\/research\/civilian-drones-privacy-and-the-federal-state-balance\/. W. C. Bennett. Civilian drones, privacy, and the federal-state balance. In The Brookings Institution--The Project on Civilian Robots, September 2014. https:\/\/www.brookings.edu\/research\/civilian-drones-privacy-and-the-federal-state-balance\/."},{"key":"e_1_3_2_2_10_1","volume-title":"June","author":"Biba K. J.","year":"1975","unstructured":"K. J. Biba . Integrity considerations for secure computer systems , June 1975 . Technical Report MTR-3153, MITRE Corporation . K. J. Biba. Integrity considerations for secure computer systems, June 1975. Technical Report MTR-3153, MITRE Corporation."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23335"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906390"},{"key":"e_1_3_2_2_13_1","volume-title":"USENIX Security","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A-R. Sadeghi . Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies . In USENIX Security , 2013 . S. Bugiel, S. Heuser, and A-R. Sadeghi. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. In USENIX Security, 2013."},{"key":"e_1_3_2_2_14_1","volume-title":"Unmanned\/Unattended Sensors and Sensor Networks XI and Advanced Free-Space Optical Communication Techniques and Applications","author":"Busset J.","year":"2015","unstructured":"J. Busset , F. Perrodin , P. Wellig , B. Ott , K. Heutschi , T. R\u00fchl , and T. Nussbaumer . Detection and tracking of drones using advanced acoustic cameras . Unmanned\/Unattended Sensors and Sensor Networks XI and Advanced Free-Space Optical Communication Techniques and Applications , 2015 . J. Busset, F. Perrodin, P. Wellig, B. Ott, K. Heutschi, T. R\u00fchl, and T. Nussbaumer. Detection and tracking of drones using advanced acoustic cameras. Unmanned\/Unattended Sensors and Sensor Networks XI and Advanced Free-Space Optical Communication Techniques and Applications, 2015."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2008.4806528"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025632"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134638"},{"key":"e_1_3_2_2_18_1","unstructured":"ChibiOS free embedded RTOS. http:\/\/chibios.org.  ChibiOS free embedded RTOS. http:\/\/chibios.org."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"e_1_3_2_2_20_1","unstructured":"CNBC. Amazon says this business opportunity could make you up to $300k a year--here's how to get into the program September 2018. https:\/\/www.cnbc.com\/2018\/09\/06\/amazon-delivery-service-partner-program-gets-thousands-of-applications.html.  CNBC. Amazon says this business opportunity could make you up to $300k a year--here's how to get into the program September 2018. https:\/\/www.cnbc.com\/2018\/09\/06\/amazon-delivery-service-partner-program-gets-thousands-of-applications.html."},{"key":"e_1_3_2_2_21_1","volume-title":"February","author":"British Broadcasting Corporation","year":"2016","unstructured":"British Broadcasting Corporation . Big rise in drone jail smuggling incidents , February 2016 . http:\/\/www.bbc.com\/news\/uk-35641453. British Broadcasting Corporation. Big rise in drone jail smuggling incidents, February 2016. http:\/\/www.bbc.com\/news\/uk-35641453."},{"key":"e_1_3_2_2_22_1","volume-title":"Gatwick airport: Drones ground flights","author":"British Broadcasting Corporation","year":"2018","unstructured":"British Broadcasting Corporation . Gatwick airport: Drones ground flights , 2018 . https:\/\/www.bbc.com\/news\/uk-england-sussex-46623754. British Broadcasting Corporation. Gatwick airport: Drones ground flights, 2018. https:\/\/www.bbc.com\/news\/uk-england-sussex-46623754."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784769"},{"key":"e_1_3_2_2_24_1","unstructured":"Data Distribution Service (DDS). https:\/\/www.omg.org\/spec\/DDS\/1.4\/PDF.  Data Distribution Service (DDS). https:\/\/www.omg.org\/spec\/DDS\/1.4\/PDF."},{"key":"e_1_3_2_2_25_1","first-page":"98","author":"Dieber B.","year":"2017","unstructured":"B. Dieber , B. Breiling , S. Taurer , S. Kacianka , S. Rass , and P. Schartner . Security for the Robot Operating System. Robotics and Autonomous Systems , 98 , 2017 . B. Dieber, B. Breiling, S. Taurer, S. Kacianka, S. Rass, and P. Schartner. Security for the Robot Operating System. Robotics and Autonomous Systems, 98, 2017.","journal-title":"Security for the Robot Operating System. Robotics and Autonomous Systems"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759659"},{"key":"e_1_3_2_2_27_1","unstructured":"Digital Sky Web Server back-end. http:\/\/github.com\/iSPIRT\/digital-sky-api.  Digital Sky Web Server back-end. http:\/\/github.com\/iSPIRT\/digital-sky-api."},{"key":"e_1_3_2_2_28_1","unstructured":"Digital Sky Web Server front-end. http:\/\/github.com\/iSPIRT\/digital-sky-app.  Digital Sky Web Server front-end. http:\/\/github.com\/iSPIRT\/digital-sky-app."},{"key":"e_1_3_2_2_29_1","unstructured":"How To Get Flipkart Franchise. https:\/\/www.steptowardbusiness.com\/flipkart-franchise.  How To Get Flipkart Franchise. https:\/\/www.steptowardbusiness.com\/flipkart-franchise."},{"key":"e_1_3_2_2_30_1","volume-title":"ACM\/USENIX Symposium on Operating System Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B-C. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In ACM\/USENIX Symposium on Operating System Design and Implementation , 2010 . W. Enck, P. Gilbert, B-C. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In ACM\/USENIX Symposium on Operating System Design and Implementation, 2010."},{"key":"e_1_3_2_2_31_1","unstructured":"The most complete DDS by eprosima the middleware experts (https:\/\/www.eprosima.com). https:\/\/github.com\/eProsima\/Fast-RTPS.  The most complete DDS by eprosima the middleware experts (https:\/\/www.eprosima.com). https:\/\/github.com\/eProsima\/Fast-RTPS."},{"key":"e_1_3_2_2_32_1","unstructured":"eProsima fast DDS docs. https:\/\/fast-rtps.docs.eprosima.com\/en\/latest\/.  eProsima fast DDS docs. https:\/\/fast-rtps.docs.eprosima.com\/en\/latest\/."},{"key":"e_1_3_2_2_33_1","volume-title":"Defense Update","author":"Eshel T.","year":"2013","unstructured":"T. Eshel . Mobile radar optimized to detect UAVs, precision guided weapons . Defense Update , 2013 . T. Eshel. Mobile radar optimized to detect UAVs, precision guided weapons. Defense Update, 2013."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"e_1_3_2_2_35_1","volume-title":"IEEE Workshop on Mobile Security Technologies","author":"Ge X.","year":"2014","unstructured":"X. Ge , H. Vijayakumar , and T. Jaeger . textscSprobes: Enforcing Kernel Code Integrity on the TrustZone . In IEEE Workshop on Mobile Security Technologies , 2014 . X. Ge, H. Vijayakumar, and T. Jaeger. textscSprobes: Enforcing Kernel Code Integrity on the TrustZone. In IEEE Workshop on Mobile Security Technologies, 2014."},{"key":"e_1_3_2_2_36_1","volume-title":"Hails: Protecting Data Privacy in Untrusted Web Applications. In USENIX Symposium on Operating System Design and Implementation","author":"Giffin D.","year":"2012","unstructured":"D. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazieres , J. Mitchell , and A. Russo . Hails: Protecting Data Privacy in Untrusted Web Applications. In USENIX Symposium on Operating System Design and Implementation , 2012 . D. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazieres, J. Mitchell, and A. Russo. Hails: Protecting Data Privacy in Untrusted Web Applications. In USENIX Symposium on Operating System Design and Implementation, 2012."},{"key":"e_1_3_2_2_37_1","unstructured":"Government of India. Digital Sky Portal -- Office of the Director General of Civil Aviation. https:\/\/digitalsky.dgca.gov.in\/.  Government of India. Digital Sky Portal -- Office of the Director General of Civil Aviation. https:\/\/digitalsky.dgca.gov.in\/."},{"key":"e_1_3_2_2_38_1","volume-title":"Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual","author":"India Government","year":"2018","unstructured":"Government of India . Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual , First Edition, November 2018 . https:\/\/diceindia.org.in\/wp-content\/uploads\/DGCA-RPAS-Guidance-Manual.pdf. Government of India. Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual, First Edition, November 2018. https:\/\/diceindia.org.in\/wp-content\/uploads\/DGCA-RPAS-Guidance-Manual.pdf."},{"key":"e_1_3_2_2_39_1","volume-title":"Revision One of","author":"India Government","year":"2019","unstructured":"Government of India . Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual , Revision One of First Edition, June 2019 . https:\/\/diceindia.org.in\/wp-content\/uploads\/Updated-DGCA-RPAS-Guidance-Manual.pdf. Government of India. Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual, Revision One of First Edition, June 2019. https:\/\/diceindia.org.in\/wp-content\/uploads\/Updated-DGCA-RPAS-Guidance-Manual.pdf."},{"key":"e_1_3_2_2_40_1","unstructured":"Aviation Systems Group. Drones and the UK Privacy Law. https:\/\/asg.ltd\/drones-and-privacy-law\/.  Aviation Systems Group. Drones and the UK Privacy Law. https:\/\/asg.ltd\/drones-and-privacy-law\/."},{"key":"e_1_3_2_2_41_1","volume-title":"IEEE Intl. Conference on Cyber Conflict","author":"Hartmann K.","year":"2013","unstructured":"K. Hartmann and C. Steup . The vulnerability of UAVs to cyber attacks-an approach to the risk assessment . In IEEE Intl. Conference on Cyber Conflict , 2013 . K. Hartmann and C. Steup. The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In IEEE Intl. Conference on Cyber Conflict, 2013."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.36288\/ROSCon2017-900267"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_2_45_1","volume-title":"August","author":"Koettl C.","year":"2018","unstructured":"C. Koettl and B. Marcolini . A closer look at the drone attack on Maduro in Venezuela , August 2018 . https:\/\/www.nytimes.com\/2018\/08\/10\/world\/americas\/venezuela-video-analysis.html. C. Koettl and B. Marcolini. A closer look at the drone attack on Maduro in Venezuela, August 2018. https:\/\/www.nytimes.com\/2018\/08\/10\/world\/americas\/venezuela-video-analysis.html."},{"key":"e_1_3_2_2_46_1","volume-title":"Information Flow Control for Standard OS Abstractions. In ACM Symposium on Operating Systems Principles","author":"Krohn M.","year":"2007","unstructured":"M. Krohn , A. Yip , M. Brodsky , N. Cliffer , M. F. Kaashoek , E. Kohler , and R. Morris . Information Flow Control for Standard OS Abstractions. In ACM Symposium on Operating Systems Principles , 2007 . M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In ACM Symposium on Operating Systems Principles, 2007."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086439.3086443"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00086"},{"key":"e_1_3_2_2_49_1","unstructured":"Amazon Logistics. Amazon Logistics--Delivery Services Partners Program. https:\/\/logistics.amazon.com\/marketing\/opportunity.  Amazon Logistics. Amazon Logistics--Delivery Services Partners Program. https:\/\/logistics.amazon.com\/marketing\/opportunity."},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX Annual Technical Conference","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In USENIX Annual Technical Conference , 2001 . P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conference, 2001."},{"key":"e_1_3_2_2_51_1","unstructured":"MAVLink Developer Guide. https:\/\/mavlink.io\/en\/.  MAVLink Developer Guide. https:\/\/mavlink.io\/en\/."},{"key":"e_1_3_2_2_52_1","first-page":"874110","volume-title":"Unmanned Systems Technology XV","author":"McClean J.","unstructured":"J. McClean , C. Stull , C. Farrar , and D. Mascare nas. A Preliminary Cyber-Physical Security Assessment of the Robot Operating System (ROS) . In Unmanned Systems Technology XV , volume 8741 , page 874110 . International Society for Optics and Photonics, 2013. J. McClean, C. Stull, C. Farrar, and D. Mascare nas. A Preliminary Cyber-Physical Security Assessment of the Robot Operating System (ROS). In Unmanned Systems Technology XV, volume 8741, page 874110. International Society for Optics and Photonics, 2013."},{"key":"e_1_3_2_2_53_1","volume-title":"Multilevel security in the UNIX tradition. Software--Practice and Experience, 22(8)","author":"McIlroy M. D.","year":"1992","unstructured":"M. D. McIlroy and J. A. Reeds . Multilevel security in the UNIX tradition. Software--Practice and Experience, 22(8) , 1992 . M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software--Practice and Experience, 22(8), 1992."},{"key":"e_1_3_2_2_54_1","volume-title":"The Brookings Institution--The Project on Civilian Robots","author":"McNeal G.","year":"2014","unstructured":"G. McNeal . Drones and aerial surveillance: Considerations for legislatures . In The Brookings Institution--The Project on Civilian Robots , November 2014 . https:\/\/www.brookings.edu\/research\/drones-and-aerial-surveillance-considerations-for-legislatures\/. G. McNeal. Drones and aerial surveillance: Considerations for legislatures. In The Brookings Institution--The Project on Civilian Robots, November 2014. https:\/\/www.brookings.edu\/research\/drones-and-aerial-surveillance-considerations-for-legislatures\/."},{"key":"e_1_3_2_2_55_1","volume-title":"1996 Annual Conference on USENIX Annual Technical Conference","author":"McVoy L.","year":"1996","unstructured":"L. McVoy and C. Staelin . Lmbench: Portable tools for performance analysis . In 1996 Annual Conference on USENIX Annual Technical Conference , 1996 . L. McVoy and C. Staelin. Lmbench: Portable tools for performance analysis. In 1996 Annual Conference on USENIX Annual Technical Conference, 1996."},{"key":"e_1_3_2_2_56_1","volume-title":"ACM Symposium on Information, Computer and Communications Security","author":"Miettinen M.","year":"2014","unstructured":"M. Miettinen , S. Heuser , W. Kronz , A.-R. Sadeghi , and N. Asokan . Conxsense--context profiling and classification for context-aware access control . In ACM Symposium on Information, Computer and Communications Security , 2014 . M. Miettinen, S. Heuser, W. Kronz, A.-R. Sadeghi, and N. Asokan. Conxsense--context profiling and classification for context-aware access control. In ACM Symposium on Information, Computer and Communications Security, 2014."},{"key":"e_1_3_2_2_57_1","volume-title":"USENIX Security","author":"Morris J.","year":"2002","unstructured":"J. Morris , S. Smalley , and G. Kroah-Hartman . Linux security modules: General security support for the Linux kernel . In USENIX Security , 2002 . J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security, 2002."},{"key":"e_1_3_2_2_58_1","author":"Myers A. C.","year":"2000","unstructured":"A. C. Myers and B. Liskov . Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology (TOSEM) , 2000 . A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology (TOSEM), 2000.","journal-title":"Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_2_59_1","volume-title":"USENIX Security","author":"Nadkarni A.","year":"2016","unstructured":"A. Nadkarni , B. Andow , W. Enck , and S. Jha . Practical DIFC enforcement on Android . In USENIX Security , 2016 . A. Nadkarni, B. Andow, W. Enck, and S. Jha. Practical DIFC enforcement on Android. In USENIX Security, 2016."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00051"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081354"},{"key":"e_1_3_2_2_62_1","unstructured":"Office of the Australian Information Commissioner. Survellience and monitoring--drones. https:\/\/www.oaic.gov.au\/privacy\/your-privacy-rights\/surveillance-and-monitoring\/drones\/.  Office of the Australian Information Commissioner. Survellience and monitoring--drones. https:\/\/www.oaic.gov.au\/privacy\/your-privacy-rights\/surveillance-and-monitoring\/drones\/."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_2_64_1","unstructured":"Pixhawk 4 Flight Controller. https:\/\/docs.px4.io\/v1.9.0\/en\/flight_controller\/pixhawk4.html.  Pixhawk 4 Flight Controller. https:\/\/docs.px4.io\/v1.9.0\/en\/flight_controller\/pixhawk4.html."},{"key":"e_1_3_2_2_65_1","volume-title":"Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications","author":"Pleban J-S.","year":"2014","unstructured":"J-S. Pleban , R. Band , and R. Creutzburg . Hacking and securing the AR Drone 2.0 quadcopter: Investigations for improving the security of a toy . In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014 , volume 9030 , 2014. J-S. Pleban, R. Band, and R. Creutzburg. Hacking and securing the AR Drone 2.0 quadcopter: Investigations for improving the security of a toy. In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, volume 9030, 2014."},{"key":"e_1_3_2_2_66_1","unstructured":"PX4 Autopilot Software. https:\/\/px4.io\/.  PX4 Autopilot Software. https:\/\/px4.io\/."},{"key":"e_1_3_2_2_67_1","volume-title":"ROS: An Open-source Robot Operating System. In ICRA workshop on open source software","volume":"3","author":"Quigley M.","year":"2009","unstructured":"M. Quigley , K. Conley , B. Gerkey , J. Faust , T. Foote , J. Leibs , R. Wheeler , and A. Y. Ng . ROS: An Open-source Robot Operating System. In ICRA workshop on open source software , volume 3 .2, 2009 . M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, and A. Y. Ng. ROS: An Open-source Robot Operating System. In ICRA workshop on open source software, volume 3.2, 2009."},{"key":"e_1_3_2_2_68_1","volume-title":"Robot Operating System Market - Snaphshot","author":"Research Transparency Market","year":"2018","unstructured":"Transparency Market Research . Robot Operating System Market - Snaphshot , 2018 . https:\/\/www.transparencymarketresearch.com\/robot-operating-system-market.html. Transparency Market Research. Robot Operating System Market - Snaphshot, 2018. https:\/\/www.transparencymarketresearch.com\/robot-operating-system-market.html."},{"key":"e_1_3_2_2_69_1","first-page":"5","author":"Rodr'iguez-Lera F. J.","year":"2018","unstructured":"F. J. Rodr'iguez-Lera , V. Matell\u00e1n-Olivera , J. Balsa-Comer\u00f3n , \u00c1. M. Guerrero-Higueras , and C. Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT , 5 , 2018 . F. J. Rodr'iguez-Lera, V. Matell\u00e1n-Olivera, J. Balsa-Comer\u00f3n, \u00c1. M. Guerrero-Higueras, and C. Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT, 5, 2018.","journal-title":"Fern\u00e1ndez-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"e_1_3_2_2_71_1","unstructured":"ROS.org--Powering the World's Robots. https:\/\/www.ros.org.  ROS.org--Powering the World's Robots. https:\/\/www.ros.org."},{"key":"e_1_3_2_2_72_1","unstructured":"ROS 2--ROS 2 documentation the latest version of the robot operating system. https:\/\/index.ros.org\/doc\/ros2\/.  ROS 2--ROS 2 documentation the latest version of the robot operating system. https:\/\/index.ros.org\/doc\/ros2\/."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299040"},{"key":"e_1_3_2_2_74_1","unstructured":"The Real-time Publish-Subscribe Protocol DDS Interoperability Wire Protocol. https:\/\/www.omg.org\/spec\/DDSI-RTPS\/2.3\/PDF.  The Real-time Publish-Subscribe Protocol DDS Interoperability Wire Protocol. https:\/\/www.omg.org\/spec\/DDSI-RTPS\/2.3\/PDF."},{"key":"e_1_3_2_2_75_1","volume-title":"USENIX Security","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In USENIX Security , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security, 2004."},{"key":"e_1_3_2_2_76_1","unstructured":"Security-enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux.  Security-enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935629"},{"key":"e_1_3_2_2_78_1","volume-title":"Radionavigation Laboratory Conference Proceedings","author":"Shepard D. P.","year":"2012","unstructured":"D. P. Shepard , J. A. Bhatti , T. E. Humphreys , and A. A. Fansler . Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks . In Radionavigation Laboratory Conference Proceedings , 2012 . D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Radionavigation Laboratory Conference Proceedings, 2012."},{"issue":"12","key":"e_1_3_2_2_79_1","volume":"10","author":"Sun H.","year":"2015","unstructured":"H. Sun , K. Sun , Y. Wang , and J. Jing . Reliable and trustworthy memory acquisition on smartphones. IEEE Transactions on Information Forensics and Security , 10 ( 12 ), December 2015 . H. Sun, K. Sun, Y. Wang, and J. Jing. Reliable and trustworthy memory acquisition on smartphones. IEEE Transactions on Information Forensics and Security, 10(12), December 2015.","journal-title":"Reliable and trustworthy memory acquisition on smartphones. IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_80_1","unstructured":"Nvidia Jetson TX2. https:\/\/www.nvidia.com\/en-us\/autonomous-machines\/embedded-systems\/jetson-tx2\/.  Nvidia Jetson TX2. https:\/\/www.nvidia.com\/en-us\/autonomous-machines\/embedded-systems\/jetson-tx2\/."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.785531"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577060"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302370"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994531"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_2_86_1","volume-title":"USENIX Security","author":"Wang R.","year":"2015","unstructured":"R. Wang , W. Enck , D. Reeves , X. Zhang , P. Ning , D. Xu , W. Zhou , and A. Azab . EASEAndroid: Automatic policy analysis and refinement for security enhanced Android via large-scale semi-supervised learning . In USENIX Security , 2015 . R. Wang, W. Enck, D. Reeves, X. Zhang, P. Ning, D. Xu, W. Zhou, and A. Azab. EASEAndroid: Automatic policy analysis and refinement for security enhanced Android via large-scale semi-supervised learning. In USENIX Security, 2015."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684069"},{"key":"e_1_3_2_2_88_1","volume-title":"DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. In Network and Distributed Systems Security Symposium","author":"Wang X.","year":"2015","unstructured":"X. Wang , K. Sun , Y. Wang , and J. Jing . DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. In Network and Distributed Systems Security Symposium , 2015 . X. Wang, K. Sun, Y. Wang, and J. Jing. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. In Network and Distributed Systems Security Symposium, 2015."},{"key":"e_1_3_2_2_89_1","first-page":"3","author":"Wang Y.","year":"2016","unstructured":"Y. Wang , H. Xia , Y. Yao , and Y. Huang . Flying eyes and hidden controllers: A qualitative study of people's privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS) , 3 , 2016 . Y. Wang, H. Xia, Y. Yao, and Y. Huang. Flying eyes and hidden controllers: A qualitative study of people's privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS), 3, 2016.","journal-title":"Proceedings on Privacy Enhancing Technologies (PoPETS)"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91590-6_11"},{"key":"e_1_3_2_2_91_1","volume-title":"SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv:1611.07060","author":"White R.","year":"2016","unstructured":"R. White , D. Christensen , I. Henrik , and D. Quigley . SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv:1611.07060 , 2016 . R. White, D. Christensen, I. Henrik, and D. Quigley. SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv:1611.07060, 2016."},{"key":"e_1_3_2_2_92_1","volume-title":"IEEE\/RSJ International Conference on Intelligent Robots and Systems","author":"White R.","year":"2018","unstructured":"R. White , H. Christensen , G. Caiazza , and A. Cortesi . Procedurally provisioned access control for robotic systems . In IEEE\/RSJ International Conference on Intelligent Robots and Systems , 2018 . R. White, H. Christensen, G. Caiazza, and A. Cortesi. Procedurally provisioned access control for robotic systems. In IEEE\/RSJ International Conference on Intelligent Robots and Systems, 2018."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741966"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_3_2_2_95_1","volume-title":"UK","author":"Young A.","year":"2018","unstructured":"A. Young . Passenger jet carrying 240 people nearly hits a drone at 15,000ft, 2018. The Daily Mail , UK , 15 September 2018 . A. Young. Passenger jet carrying 240 people nearly hits a drone at 15,000ft, 2018. The Daily Mail, UK, 15 September 2018."},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417858","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":96,"alternative-id":["10.1145\/3372297.3417858","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417858","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}