Is this project an undergraduate, graduate, or faculty project?
Undergraduate
Project Type
group
Campus
Daytona Beach
Authors' Class Standing
Jesse Gatewood, Junior; Luis Mora, Senior; Erin Orchekowski, Senior; J. Phillip Craiger, Faculty Mentor, Associate Professor of Cybersecurity
Lead Presenter's Name
Jesse Gatewood
Faculty Mentor Name
J. Phillip Craiger
Loading...
Abstract
Our research objective was to analyze known vulnerabilities and exploits of several commercial off the shelf (COTS) small unmanned aircraft systems (sUAS), identify new vulnerabilities and exploits, develop risk assessments for each sUAS, and relate our findings to the Department of Defense’s use of sUASs. The first step of our research was a comprehensive literature review of known exploits and vulnerabilities of sUAS. Second, we completed penetration testing on the sUAS to identify new exploits or vulnerabilities. Utilizing risk assessment models such as the DREAD computer-security model, our team analyzed various tested COTS sUAS by applying the model to each sUAS. Finally, after identifying vulnerabilities, risk assessment scores, and countermeasures, we described the importance of the application of risk assessments to the U.S. Navy’s increasing use of sUAS for reconnaissance, surveillance, and intelligence operations.
Did this research project receive funding support (Spark, SURF, Research Abroad, Student Internal Grants, Collaborative, Climbing, or Ignite Grants) from the Office of Undergraduate Research?
No
Small Unmanned Aircraft Systems (sUAS) Vulnerabilities, Exploits, and Risk Assessment
Our research objective was to analyze known vulnerabilities and exploits of several commercial off the shelf (COTS) small unmanned aircraft systems (sUAS), identify new vulnerabilities and exploits, develop risk assessments for each sUAS, and relate our findings to the Department of Defense’s use of sUASs. The first step of our research was a comprehensive literature review of known exploits and vulnerabilities of sUAS. Second, we completed penetration testing on the sUAS to identify new exploits or vulnerabilities. Utilizing risk assessment models such as the DREAD computer-security model, our team analyzed various tested COTS sUAS by applying the model to each sUAS. Finally, after identifying vulnerabilities, risk assessment scores, and countermeasures, we described the importance of the application of risk assessments to the U.S. Navy’s increasing use of sUAS for reconnaissance, surveillance, and intelligence operations.