[1]马克,孙迅,聂裕平.GPS生成式欺骗干扰关键技术[J].航天电子对抗,2014,30(6):24-26.
[2]SU J,HE J,CHENG P,et al.A stealthy GPS spoofing strategy for manipulating the trajectory of an unmanned aerial vehicl[J].IFAC-PapersOnLine,2016,49(22):291-296.
[3]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[4]KIM A,WAMPLER B,GOPPERT J,et al.Cyber attack vulnerabilities analysis for unmanned aerialvehicles[M].[S.l.]:Infotech,2013.
[5]DAVIDSON D,WU H,JELLINEK R,et al.Controlling UAVs with sensor input spoofing attacks[C]//Proceedings of the 10th USENIX Conference on Offensive Technologies.San Francisco,USA:USENIX Association,2016:221-231.
[6]CHILDERS B.Hacking the parrot A.R.drone[J].Linux Journal,2014(241):1.
[7]PLEBAN J S,BAND R,CREUTZBURG R .Hacking and securing the AR.Drone 2.0 quadcopter:investigations for improving the security of a toy[C]//Proceedings of 2014 Mobile Devices and Multimedia:Enabling Technologies,Algorithms,and Applications.San Francisco,USA:[s.n.],2014:1-12.
[8]NILSR.Hacking a professional drone[EB/OL].[2017-11-20].https://www.rsaconference.com/events/us16/agenda/sessions/2273/hacking-a-professional-drone.
[9]GMXP.315晚会报道的无人机是怎么被劫持的?[EB/OL].[2017-11-20].https://security.tencent.com/index.php/blog/msg/103.
[10]张兴凯,王喜发,戴紫彬.无人机遥控指令加密方式的研究[J].电子技术应用,2008,34(5):141-144.
[11]BOGDANOV A,KHOVRATOVICH D,RECHBERGER C,et al.Biclique cryptanalysis of the full AES[C]//Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2011:344-371.
[12]PAUL C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[M].Berlin,Germany:Springer,1996:104-113.
[13]MANTIN I,SHAMIR A.A practical attack on broadcast RC4[M].Berlin,Germany:Springer,2001:152-164.
[14]DAWNERP.RC4加密已不再安全,破解效率极高[EB/OL].[2017-11-20].http://www.freebuf.com/news/72622.html.
[15]MANIFAVAS C,HATZIVASILIS G,FYSARAKIS K,et al.Lightweight cryptography for embedded systems-a comparative analysis[M].Berlin,Germany:Springer,2014:333-349.
[16]张兴凯,王喜发,隗云.无人机上行链路的安全策略研究[J].计算机安全,2008(3):62-64.
[17]DEWANGAN C P,AGRAWAL S,MANDAL A K,et al.Study of avalanche effect in AES using binary codes[C]//Proceedings of 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies.Washington D.C.,USA:IEEE Press,2012:183-187. |