Is this project an undergraduate, graduate, or faculty project?

Undergraduate

Project Type

group

Campus

Daytona Beach

Authors' Class Standing

Jesse Gatewood, Junior; Luis Mora, Senior; Erin Orchekowski, Senior; J. Phillip Craiger, Faculty Mentor, Associate Professor of Cybersecurity

Lead Presenter's Name

Jesse Gatewood

Faculty Mentor Name

J. Phillip Craiger

Loading...

Media is loading
 

Abstract

Our research objective was to analyze known vulnerabilities and exploits of several commercial off the shelf (COTS) small unmanned aircraft systems (sUAS), identify new vulnerabilities and exploits, develop risk assessments for each sUAS, and relate our findings to the Department of Defense’s use of sUASs. The first step of our research was a comprehensive literature review of known exploits and vulnerabilities of sUAS. Second, we completed penetration testing on the sUAS to identify new exploits or vulnerabilities. Utilizing risk assessment models such as the DREAD computer-security model, our team analyzed various tested COTS sUAS by applying the model to each sUAS. Finally, after identifying vulnerabilities, risk assessment scores, and countermeasures, we described the importance of the application of risk assessments to the U.S. Navy’s increasing use of sUAS for reconnaissance, surveillance, and intelligence operations.

Did this research project receive funding support (Spark, SURF, Research Abroad, Student Internal Grants, Collaborative, Climbing, or Ignite Grants) from the Office of Undergraduate Research?

No

Share

COinS
 

Small Unmanned Aircraft Systems (sUAS) Vulnerabilities, Exploits, and Risk Assessment

Our research objective was to analyze known vulnerabilities and exploits of several commercial off the shelf (COTS) small unmanned aircraft systems (sUAS), identify new vulnerabilities and exploits, develop risk assessments for each sUAS, and relate our findings to the Department of Defense’s use of sUASs. The first step of our research was a comprehensive literature review of known exploits and vulnerabilities of sUAS. Second, we completed penetration testing on the sUAS to identify new exploits or vulnerabilities. Utilizing risk assessment models such as the DREAD computer-security model, our team analyzed various tested COTS sUAS by applying the model to each sUAS. Finally, after identifying vulnerabilities, risk assessment scores, and countermeasures, we described the importance of the application of risk assessments to the U.S. Navy’s increasing use of sUAS for reconnaissance, surveillance, and intelligence operations.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.