{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:34Z","timestamp":1750220194808,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3565182","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"738-741","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Safety Risks and Safety Protection of UAV System"],"prefix":"10.1145","author":[{"given":"Shaogang","family":"Liu","sequence":"first","affiliation":[{"name":"West Yunnan University, China"}]},{"given":"Jiangli","family":"Chen","sequence":"additional","affiliation":[{"name":"West Yunnan University, China"}]},{"given":"Guihua","family":"Hong","sequence":"additional","affiliation":[{"name":"West Yunnan University, China"}]},{"given":"Lizhu","family":"Cao","sequence":"additional","affiliation":[{"name":"West Yunnan University, China"}]},{"given":"Ming","family":"Wu","sequence":"additional","affiliation":[{"name":"West Yunnan University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"volume-title":"Technology wind","year":"2019","key":"e_1_3_2_1_1_1","unstructured":"Zhao Great Wall, Gao Xiang, Fan Qiongjian , Analysis of UAV flight safety risk and countermeasures [J] , Technology wind , 2019 ,32 Zhao Great Wall, Gao Xiang, Fan Qiongjian, Analysis of UAV flight safety risk and countermeasures [J], Technology wind, 2019,32"},{"issue":"10","key":"e_1_3_2_1_2_1","first-page":"7","article-title":"Development trend of UAV system [J]","volume":"20","year":"2021","unstructured":"Wang Zhaoxuan, Li Yang, Lv Yang, Hao Zhidong, Yang Libin, Liu Huixia, Feng Zhaowen, Pan Quan , Development trend of UAV system [J] , Software Guide , 2021 , 20 ( 10 ): 7 - 12 Wang Zhaoxuan, Li Yang, Lv Yang, Hao Zhidong, Yang Libin, Liu Huixia, Feng Zhaowen, Pan Quan, Development trend of UAV system [J], Software Guide, 2021,20 (10): 7-12","journal-title":"Software Guide"},{"volume-title":"Defcon Conference","author":"LUO A","key":"e_1_3_2_1_3_1","unstructured":"LUO A , Drones hijacking [C] , Defcon Conference , 2016: 561-578 LUO A, Drones hijacking [C], Defcon Conference, 2016: 561-578"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0158-4"},{"volume-title":"Proceedings of the International Conference on Runtime Verification","author":"PIKE L","key":"e_1_3_2_1_5_1","unstructured":"PIKE L , HICKEY P , ELLIOTT T , , Track OS : a security-aware real-time operating system [C] , Proceedings of the International Conference on Runtime Verification , 2016: 40-44 PIKE L, HICKEY P, ELLIOTT T, , TrackOS: a security-aware real-time operating system [C], Proceedings of the International Conference on Runtime Verification, 2016: 40-44"},{"key":"e_1_3_2_1_6_1","unstructured":"BELIKOVETSKY S YAMPOLSKIY M TOH J Dr0wned-cyber-physical attack with additive manufacturing [EB\/OL] https: \/\/arxiv org\/abs\/1609 00133v1  BELIKOVETSKY S YAMPOLSKIY M TOH J Dr0wned-cyber-physical attack with additive manufacturing [EB\/OL] https: \/\/arxiv org\/abs\/1609 00133v1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2906228"},{"volume-title":"2017 9th International Conference on Wireless Communications and Signal Processing (WCSP)","author":"LIU C","key":"e_1_3_2_1_8_1","unstructured":"LIU C , LEE J , QUEK T Q S , Secure UAV communication in the presence of active eavesdropper [C] , 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP) , 2017: 1-6 LIU C, LEE J, QUEK T Q S, Secure UAV communication in the presence of active eavesdropper [C], 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP) , 2017: 1-6"},{"key":"e_1_3_2_1_9_1","unstructured":"FOTOUHI A QIANG H DING M Survey on UAV cellular communications: practical aspects [DB\/OL] http: \/\/arxiv org\/pdf\/1809 0175 2 FOTOUHI A QIANG H DING M Survey on UAV cellular communications: practical aspects [DB\/OL] http: \/\/arxiv org\/pdf\/1809 0175 2"},{"volume-title":"Proceedings of the 2019 1st International Conference on Unmanned Vehicle ystems-Oman (UVS)","author":"WESTERLUND O","key":"e_1_3_2_1_10_1","unstructured":"WESTERLUND O , ASIF R , Drone hacking with raspberry-pi 3 and wifi pineapple: security and privacy threats for the Internet-of-Things [C] , Proceedings of the 2019 1st International Conference on Unmanned Vehicle ystems-Oman (UVS) , 2019: 64-75 WESTERLUND O, ASIF R, Drone hacking with raspberry-pi 3 and wifi pineapple: security and privacy threats for the Internet-of-Things [C] , Proceedings of the 2019 1st International Conference on Unmanned Vehicle ystems-Oman (UVS) , 2019: 64-75"},{"volume-title":"InProceedings of the 12th ACM conference onComputer and communications security (CCS\u201905)","year":"2005","key":"e_1_3_2_1_11_1","unstructured":"Mart\u00edn Abadi,Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti , 2005 , Control-flow integrity , InProceedings of the 12th ACM conference onComputer and communications security (CCS\u201905) , ACM, New York, NY, USA,340-353 Mart\u00edn Abadi,Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti, 2005, Control-flow integrity, InProceedings of the 12th ACM conference onComputer and communications security (CCS\u201905), ACM, New York, NY, USA,340-353"},{"volume-title":"Proceedings of the 2013 IEEE Symposium on Security andPrivacy (SP\u201913)","year":"2013","key":"e_1_3_2_1_12_1","unstructured":"Chao Zhang, TaoWei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou , 2013 , Practical Control Flow Integrity and Randomization for Binary Executables , In Proceedings of the 2013 IEEE Symposium on Security andPrivacy (SP\u201913) , IEEE Computer Society, Washington, DC, USA, 559-573, DOI=http:\/\/dx, doi, org\/10, 1109\/SP , 2013, 44 Chao Zhang, TaoWei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou, 2013, Practical Control Flow Integrity and Randomization for Binary Executables, In Proceedings of the 2013 IEEE Symposium on Security andPrivacy (SP\u201913), IEEE Computer Society, Washington, DC, USA, 559-573, DOI=http:\/\/dx, doi, org\/10, 1109\/SP, 2013, 44"},{"volume-title":"Proceedingsof the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915)","year":"2015","key":"e_1_3_2_1_13_1","unstructured":"Ali JoseMashtizadeh, Andrea Bittau, Dan Boneh, and David Mazi\u00e8res , 2015 , CCFI:Cryptographically Enforced Control Flow Integrity , In Proceedingsof the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915) , ACM, New York, NY, USA,941-951 Ali JoseMashtizadeh, Andrea Bittau, Dan Boneh, and David Mazi\u00e8res, 2015, CCFI:Cryptographically Enforced Control Flow Integrity, In Proceedingsof the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915), ACM, New York, NY, USA,941-951"},{"key":"e_1_3_2_1_14_1","unstructured":"ALHAWI O M MUSTAFA M A CORDEIRO L C Finding security vulnerabilities in unmanned aerial vehicles using software verification [EB\/OL] https: \/\/arxiv org\/abs\/1906 11488v1  ALHAWI O M MUSTAFA M A CORDEIRO L C Finding security vulnerabilities in unmanned aerial vehicles using software verification [EB\/OL] https: \/\/arxiv org\/abs\/1906 11488v1"},{"key":"e_1_3_2_1_15_1","volume-title":"Xi'an","author":"YE X H","year":"2019","unstructured":"YE X H , Research on vulnerability mining of UAV software system based on fuzzy test [D] , Xi'an : Xidian University , 2019 YE X H, Research on vulnerability mining of UAV software system based on fuzzy test [D] , Xi'an: Xidian University, 2019"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"42","article-title":"A secure operating system architecture based on Linux against communication offense with root exploit for unmanned aerial vehicles [J]","volume":"16","author":"KOO K","year":"2017","unstructured":"KOO K , LEE W Y , CHO S R , , A secure operating system architecture based on Linux against communication offense with root exploit for unmanned aerial vehicles [J] , Journal of Information Processing Systems , 2017 , 16 ( 1 ) : 42 - 48 KOO K, LEE W Y, CHO S R, , A secure operating system architecture based on Linux against communication offense with root exploit for unmanned aerial vehicles [J], Journal of Information Processing Systems, 2017, 16 (1) : 42-48","journal-title":"Journal of Information Processing Systems"},{"volume-title":"Proceedings of the 2019 15th International Wireless Communications&Mobile Computing Conference (IWCMC)","author":"ALLOUCH A","key":"e_1_3_2_1_17_1","unstructured":"ALLOUCH A , CHEIKHROUHOU O , KOUB A A , , MAVS ec : securing the MAVLink protocol for Ardupilot\/PX4 unmanned aerial systems [C] , Proceedings of the 2019 15th International Wireless Communications&Mobile Computing Conference (IWCMC) , 2019: 431-450 ALLOUCH A, CHEIKHROUHOU O, KOUB A A, , MAVSec: securing the MAVLink protocol for Ardupilot\/PX4 unmanned aerial systems [C] , Proceedings of the 2019 15th International Wireless Communications&Mobile Computing Conference (IWCMC) , 2019: 431-450"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10020043"},{"key":"e_1_3_2_1_19_1","volume-title":"HEREDIA G, , Securing UAV communications using ROS with custom ECIES-based method [C]","author":"FERNANDEZ M J","year":"2019","unstructured":"FERNANDEZ M J , SANCHEZ CUEVAS P J , HEREDIA G, , Securing UAV communications using ROS with custom ECIES-based method [C] , 2019 workshop on research, Education and Development of Unmanned Aerial Systems (REDUAS) , 2019: 153-164, FERNANDEZ M J, SANCHEZ CUEVAS P J, HEREDIA G, , Securing UAV communications using ROS with custom ECIES-based method [C] , 2019 workshop on research, Education and Development of Unmanned Aerial Systems (REDUAS) , 2019: 153-164,"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900045"},{"volume-title":"Proceedings of the Globecom IEEE Global Communications Conference","author":"ZHANG G","key":"e_1_3_2_1_21_1","unstructured":"ZHANG G , WU Q , CUI M , , Securing UAV communications viatrajectory optimization [C] , Proceedings of the Globecom IEEE Global Communications Conference , 2017: 84-92 ZHANG G, WU Q, CUI M, , Securing UAV communications viatrajectory optimization [C] , Proceedings of the Globecom IEEE Global Communications Conference, 2017: 84-92"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2792014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2853723"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565182","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3565182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:37Z","timestamp":1750186957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":23,"alternative-id":["10.1145\/3558819.3565182","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3565182","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}