Skip to main content
Log in

ARDrone corruption

  • Original Paper
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

A drone is a machine which functions either by the remote control of a navigator or pilot or autonomously, that is, as a self-directing entity. Their largest use is within military applications. This machines are smaller than piloted vehicle and so are less visible or invisible (furtive). The goal of our study is to show, on a commercial drone, the effect of the miniaturization. We use the Ardrone by Parrot, and different attacks are performed, from the DOS attack to the illegal takeover of the drone. Attacks are explained and detailed, to allow the readers to replay the attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Raqi insurgents hacked Predator drone feeds, U.S. official indicates, CNN. http://articles.cnn.com/2009-12-17/us/drone.video.hacked_1_uav-systems-encryption-feeds?_s=PM:US

  2. Computer Virus Hits U.S. Drone Fleet, Wired Magazine. http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/

  3. Parrot, ArDrone. http://ardrone.parrot.com/parrot-ar-drone/fr/

  4. Parrot, ArDrone API. http://projects.ardrone.org/

  5. Turning the Parrot AR.Drone into an autonomous UAV. http://diydrones.com, http://diydrones.com/profiles/blogs/turning-the-parrot-ardrone

  6. Programming and controlling the ARDrone with Urbi, Jean Charles Mammana. https://projects.ardrone.org/boards/1/topics/show/747

  7. SkyNET: a 3G-enabled mobile attack drone and stealth botmaster. In: Reed, T., Geis, J., Dietrich, S., (eds.) Proceedings of the 5th USENIX conference on Offensive technologies

  8. List of Linux distributions, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=List_of_Linux_distributions&oldid=457844580

  9. Wireshark. http://www.wireshark.org/

  10. Tcpdump. http://www.tcpdump.org/

  11. Aircrack-ng. http://www.aircrack-ng.org/

  12. ASCII, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=ASCII&oldid=457780963

  13. Hayes command set, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Hayes_command_set

  14. Nmap Security scanner. http://nmap.org/

  15. MAC filtering. In Wikipedia, The Free Encyclopedia. (from http://en.wikipedia.org/w/index.php?title=MAC_filtering&oldid=432602911)

  16. Telnet, Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/wiki/Telnet

  17. CodeSourcery, G++ Lite 2009q1-203 for ARM GNU/Linux. http://www.codesourcery.com/sgpp/lite/arm/portal/release858

  18. Video for Linux 2 specification. http://v4l2spec.bytesex.org

  19. Linux, Ioctl Man page. http://www.kernel.org/doc/man-pages/online/pages/man2/ioctl.2.html

  20. Hping3, Hping Active Network Security Tool. http://www.hping.org/

  21. Scapy. http://www.secdev.org/projects/scapy

  22. Wifitap. http://sid.rstack.org/static/articles/w/i/f/Wifitap.html

  23. Linux System call, Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/System_call

  24. The Linux Kernel Module Programming Guide,How Do Modules Get Into The Kernel. http://tldp.org/LDP/lkmpg/2.4/html/x49.html

  25. Rootkit kernel sous Linux 2.6, Blog communautaire nibbles. http://blog.nibbles.fr/1021

  26. Mplayer. http://www.mplayerhq.hu/

  27. Mjpeg Tools, Jpeg2YUV. http://mjpeg.sourceforge.net/

  28. The Z Shell. http://www.zsh.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eddy Deligne.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Deligne, E. ARDrone corruption. J Comput Virol 8, 15–27 (2012). https://doi.org/10.1007/s11416-011-0158-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-011-0158-4

Keywords

Navigation