{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:36:52Z","timestamp":1775745412381,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3379529","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"153-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["DRAT"],"prefix":"10.1145","author":[{"given":"Mohammad Shameel","family":"bin Mohammad Fadilah","sequence":"first","affiliation":[{"name":"University of Glasgow, Singapore, Singapore"}]},{"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"given":"Peter","family":"Loh","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"given":"Melissa","family":"Chua","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Agency, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_3_1_1","unstructured":"2019. Drones to Survey Dengue Hotspots. https:\/\/www.smartnation.sg\/what-issmart- nation\/initiatives\/Urban-Living\/drones-to-survey-dengue-hotspots-1"},{"key":"e_1_3_2_3_2_1","volume-title":"Insurgents hack US drones. Wall Street Journal 17","author":"Gorman Siobhan","year":"2009","unstructured":"Siobhan Gorman, Yochi J Dreazen, and August Cole. 2009. Insurgents hack US drones. Wall Street Journal 17 (2009)."},{"key":"e_1_3_2_3_3_1","unstructured":"Osqzss. 2018. osqzss\/gps-sdr-sim. https:\/\/github.com\/osqzss\/gps-sdr-sim"},{"key":"e_1_3_2_3_4_1","unstructured":"Michael Ossmann. 2019. mossmann\/hackrf. https:\/\/github.com\/mossmann\/ hackrf\/wiki"},{"key":"e_1_3_2_3_5_1","volume-title":"Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications","author":"Pleban Johann-Sebastian","year":"2014","unstructured":"Johann-Sebastian Pleban, Ricardo Band, and Reiner Creutzburg. 2014. Hacking and securing the AR.. In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, Vol. 9030. International Society for Optics and Photonics, 90300L."},{"key":"e_1_3_2_3_6_1","unstructured":"Mohit Sagar. 2019. Drones are a part of Singapore's Smart Nation strategy. https:\/\/www.opengovasia.com\/drones-are-a-part-of-singapores-smartnation- strategy\/"},{"key":"e_1_3_2_3_7_1","unstructured":"Daniel P Shepard Jahshan A Bhatti and Todd E Humphreys. 2012. Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle. (2012)."},{"key":"e_1_3_2_3_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--31875--2_20"},{"key":"e_1_3_2_3_9_1","volume-title":"Radio jamming attacks against two popular mobile networks","author":"St\u00e5hlberg Mika","year":"2000","unstructured":"Mika St\u00e5hlberg. 2000. Radio jamming attacks against two popular mobile networks. In In: Helsinki University of Technology Seminar on Network Security. (2000."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3379529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3379529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3379529"}},"subtitle":["A Drone Attack Tool for Vulnerability Assessment"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":9,"alternative-id":["10.1145\/3374664.3379529","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3379529","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}