Vulnerability and Threat Analysis for Drones

We are currently trying to answer following questions by doing our research:

  • What are the main vulnerabilities for Drones and  can we apply threat analysis on them?
  • How to identify the operations are valid and can we model the normal drone behavior?
  • How can we understand if any malicious components/activities enabled?
  • How to operate drones in a resilient way in spite of cyber attacks and physical attacks?

UNT Center:

UNT Department:

UNT Lab:

Document: 
AttachmentSize
PDF icon Vulnerability_and_Threat_Analysis_of_UAVs.pdf1.9 MB