{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:41Z","timestamp":1767339341919,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["2039606"],"award-info":[{"award-number":["2039606"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637672","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"902-914","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9797-8667","authenticated-orcid":false,"given":"Maryna","family":"Veksler","sequence":"first","affiliation":[{"name":"Knight Foundation School of Computing and Information Sciences\/Advanced Wireless and Security Lab, Florida International University, Miami, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7103-4545","authenticated-orcid":false,"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[{"name":"Knight Foundation School of Computing and Information Sciences\/Advanced Wireless and Security Lab, Florida International University, Miami, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Knight Foundation School of Computing and Information Sciences\/Cyber-Physical Systems Security Lab, Florida International University, Miami, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 621--628","author":"Allouch Azza","year":"2019","unstructured":"Azza Allouch, Omar Cheikhrouhou, Anis Koub\u00e2a, Mohamed Khalgui, and Tarek Abbes. 2019. MAVSec: Securing the MAVLink protocol for ardupilot\/PX4 unmanned aerial systems. In 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 621--628."},{"key":"e_1_3_2_1_2_1","unstructured":"Bitcraze. 2023. CrazyFlie 2.1. https:\/\/www.bitcraze.io\/products\/crazyflie-2-1\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Pedro Cabrera. 2018. Parrot drones hijacking | RSA conference. https:\/\/www.rsaconference.com\/Library\/presentation\/USA\/2018\/parrot-drones-hijacking"},{"key":"e_1_3_2_1_4_1","volume-title":"An information-theoretic model for steganography. Information and computation 192, 1","author":"Cachin Christian","year":"2004","unstructured":"Christian Cachin. 2004. An information-theoretic model for steganography. Information and computation 192, 1 (2004), 41--56."},{"key":"e_1_3_2_1_5_1","volume-title":"Internet of drones (iod): Threats, vulnerability, and security perspectives. arXiv preprint arXiv:1808.00203","author":"Choudhary Gaurav","year":"2018","unstructured":"Gaurav Choudhary, Vishal Sharma, Takshi Gupta, Jiyoon Kim, and Ilsun You. 2018. Internet of drones (iod): Threats, vulnerability, and security perspectives. arXiv preprint arXiv:1808.00203 (2018)."},{"key":"e_1_3_2_1_6_1","volume-title":"Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. 2022 IEEE Symposium on Security and Privacy (SP)","author":"Classen Jiska","year":"2021","unstructured":"Jiska Classen, Francesco Gringoli, Michael Hermann, and Matthias Hollick. 2021. Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. 2022 IEEE Symposium on Security and Privacy (SP) (2021), 1229--1245. https:\/\/api.semanticscholar.org\/CorpusID:245117931"},{"key":"e_1_3_2_1_7_1","unstructured":"Gerald Combs. 2023. Wireshark. https:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_8_1","volume-title":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 845--848","author":"Denney Kyle","year":"2016","unstructured":"Kyle Denney, A Selcuk Uluagac, Kemal Akkaya, and Shekhar Bhansali. 2016. A novel storage covert channel on wearable devices using status bar notifications. In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 845--848."},{"key":"e_1_3_2_1_9_1","volume-title":"An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications. Versatile Cybersecurity","author":"Denney Kyle","year":"2018","unstructured":"Kyle Denney, A Selcuk Uluagac, Hidayet Aksu, and Kemal Akkaya. 2018. An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications. Versatile Cybersecurity (2018), 1--17."},{"key":"e_1_3_2_1_10_1","unstructured":"Dronecode. 2023. PX4 Autopilot. https:\/\/px4.io\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Droneode. 2019. QGround Control GCS. http:\/\/qgroundcontrol.com\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"e_1_3_2_1_13_1","volume-title":"2021 18th International Conference on Privacy, Security and Trust (PST). IEEE, 1--10","author":"Guri Mordechai","year":"2021","unstructured":"Mordechai Guri. 2021. Gairoscope: Leaking data from air-gapped computers to nearby smartphones using speakers-to-gyro communication. In 2021 18th International Conference on Privacy, Security and Trust (PST). IEEE, 1--10."},{"key":"e_1_3_2_1_14_1","unstructured":"Sean Hollister. 2020. The US government grounded DJI --- but here are the five drones it just approved. https:\/\/www.theverge.com\/2020\/8\/20\/21376917\/drone-us-government-approved-dod-diu-uas-blue-china"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3209255"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/MWC.001.2000454","article-title":"Covert communication in UAV-assisted air-ground networks","volume":"28","author":"Jiang Xu","year":"2021","unstructured":"Xu Jiang, Xinying Chen, Jie Tang, Nan Zhao, Xiu Yin Zhang, Dusit Niyato, and Kai-Kit Wong. 2021. Covert communication in UAV-assisted air-ground networks. IEEE Wireless Communications 28, 4 (2021), 190--197.","journal-title":"IEEE Wireless Communications"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"e_1_3_2_1_18_1","unstructured":"Swati Khandelwal. 2015. Maldrone - first ever backdoor malware for drones. https:\/\/thehackernews.com\/2015\/01\/MalDrone-backdoor-drone-malware.html"},{"key":"e_1_3_2_1_19_1","volume-title":"[Proceedings] WESCANEX'91","author":"Kinsner W","year":"1991","unstructured":"W Kinsner and RH Greenfield. 1991. The Lempel-Ziv-Welch (LZW) data compression algorithm for packet radio. In [Proceedings] WESCANEX'91. IEEE, 225--229."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924410"},{"key":"e_1_3_2_1_21_1","volume-title":"The 29th Network and Distributed System Security (NDSS) Symposium","author":"Li Zhengxiong","year":"2022","unstructured":"Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, and Wenyao Xu. 2022. SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing. In The 29th Network and Distributed System Security (NDSS) Symposium 2022. The Internet Society."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS52077.2021.00059"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"102788","DOI":"10.1016\/j.adhoc.2022.102788","article-title":"Covert communication in multi-hop UAV network","volume":"128","author":"Mallikarachchi Dilshani","year":"2022","unstructured":"Dilshani Mallikarachchi, KokSheik Wong, and Joanne Mun-Yee Lim. 2022. Covert communication in multi-hop UAV network. Ad Hoc Networks 128 (2022), 102788.","journal-title":"Ad Hoc Networks"},{"key":"e_1_3_2_1_24_1","unstructured":"Drone Mapper. 2019. Greg 1 and 2 Reservoir Capacity Map with GCP. https:\/\/dronemapper.com\/sample_data\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109626"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102207"},{"key":"e_1_3_2_1_27_1","unstructured":"Aleksandra Mileva Aleksandar Velinov and Done Stojanov. 2018. New covert channels in Internet of Things. (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342555"},{"key":"e_1_3_2_1_29_1","unstructured":"Dronecode Project. [n. d.]. MAVLink. https:\/\/mavlink.io\/en\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Dronecode Project. 2023. Heartbeat\/Connection Protocol. https:\/\/mavlink.io\/en\/services\/heartbeat.html"},{"key":"e_1_3_2_1_31_1","unstructured":"Dronecode Project. 2023. MAVLink - Micro Air Vehicle Message Marshalling Library. https:\/\/github.com\/mavlink\/mavlink"},{"key":"e_1_3_2_1_32_1","unstructured":"Dronecode Project. 2023. MAVLink. Versions. https:\/\/mavlink.io\/en\/guide\/mavlink_version.html"},{"key":"e_1_3_2_1_33_1","unstructured":"Dronecode Project. 2023. Message Signing. https:\/\/mavlink.io\/en\/guide\/message_signing.html"},{"key":"e_1_3_2_1_34_1","unstructured":"Dronecode Project. 2023. Routing. https:\/\/mavlink.io\/en\/guide\/routing.html"},{"key":"e_1_3_2_1_35_1","unstructured":"Dronecode Project. 2023. Traffic Management and Avoidance. https:\/\/mavlink.io\/en\/services\/traffic_management.html"},{"key":"e_1_3_2_1_36_1","unstructured":"Dronecode Project. 2023. Tunnel Protocol. https:\/\/mavlink.io\/en\/services\/tunnel.html"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485833"},{"key":"e_1_3_2_1_38_1","volume-title":"Narseo Vallina-Rodriguez, and Serge Egelman.","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In 28th USENIX security symposium. 603--620."},{"key":"e_1_3_2_1_39_1","unstructured":"Reuters. 2023. India bars makers of military drones from using Chinese parts. https:\/\/bdnews24.com\/neighbours\/6j6fc42sv1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485272"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485272"},{"key":"e_1_3_2_1_42_1","volume-title":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 1--6.","author":"Seo Jun O","year":"2019","unstructured":"Jun O Seo, Sathiamoorthy Manoharan, and Ulrich Speidel. 2019. Steganalysis of storage-based covert channels using entropy. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 1--6."},{"key":"e_1_3_2_1_43_1","volume-title":"A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5, 1","author":"Shannon Claude Elwood","year":"2001","unstructured":"Claude Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5, 1 (2001), 3--55."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.895799"},{"key":"e_1_3_2_1_45_1","unstructured":"Ardupilot suite. 2023. ArduPilot. https:\/\/ardupilot.org\/"},{"key":"e_1_3_2_1_46_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Ustiugov Dmitrii","year":"2020","unstructured":"Dmitrii Ustiugov, Plamen Petrov, MR Siavash Katebzadeh, and Boris Grot. 2020. Bankrupt covert channel: Turning network predictability into vulnerability. In 14th USENIX Workshop on Offensive Technologies (WOOT 20)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","first-page":"3321","DOI":"10.1109\/JSAC.2021.3088667","article-title":"Optimal transmit power and flying location for UAV covert wireless communications","volume":"39","author":"Yan Shihao","year":"2021","unstructured":"Shihao Yan, Stephen V Hanly, and Iain B Collings. 2021. Optimal transmit power and flying location for UAV covert wireless communications. IEEE Journal on Selected Areas in Communications 39, 11 (2021), 3321--3333.","journal-title":"IEEE Journal on Selected Areas in Communications"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":47,"alternative-id":["10.1145\/3634737.3637672","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637672","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}