{"id":"https://openalex.org/W2954700723","doi":"https://doi.org/10.1109/siot48044.2019.9637109","title":"Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification","display_name":"Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification","publication_year":2019,"publication_date":"2019-09-26","ids":{"openalex":"https://openalex.org/W2954700723","doi":"https://doi.org/10.1109/siot48044.2019.9637109","mag":"2954700723"},"language":"en","primary_location":{"id":"doi:10.1109/siot48044.2019.9637109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siot48044.2019.9637109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Workshop on Secure Internet of Things (SIOT)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/123456789/660278","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073221095","display_name":"Omar M. Alhawi","orcid":null},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Omar M. Alhawi","raw_affiliation_strings":["University of Manchester, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"University of Manchester, Manchester, UK","institution_ids":["https://openalex.org/I28407311"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074423181","display_name":"Mustafa Mustafa","orcid":"https://orcid.org/0000-0002-8772-8023"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["BE","GB"],"is_corresponding":false,"raw_author_name":"Mustafa A. Mustafa","raw_affiliation_strings":["University of Manchester, UK","imec-COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"University of Manchester, UK","institution_ids":["https://openalex.org/I28407311"]},{"raw_affiliation_string":"imec-COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5096991892","display_name":"Lucas C. Cordiro","orcid":null},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lucas C. Cordiro","raw_affiliation_strings":["University of Manchester, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"University of Manchester, Manchester, UK","institution_ids":["https://openalex.org/I28407311"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073221095"],"corresponding_institution_ids":["https://openalex.org/I28407311"],"apc_list":null,"apc_paid":null,"fwci":1.40306665,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.81071585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.7873896360397339},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7758148908615112},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.613379955291748},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.6130639314651489},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5794222354888916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5621605515480042},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.5425816178321838},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.5114220976829529},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4562370479106903},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.43399906158447266},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4244891107082367},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4095860719680786},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2420271635055542},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21689727902412415},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.16964352130889893},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.16406786441802979}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.7873896360397339},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7758148908615112},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.613379955291748},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6130639314651489},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5794222354888916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5621605515480042},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.5425816178321838},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.5114220976829529},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4562370479106903},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.43399906158447266},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4244891107082367},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4095860719680786},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2420271635055542},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21689727902412415},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.16964352130889893},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.16406786441802979}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/siot48044.2019.9637109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/siot48044.2019.9637109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Workshop on Secure Internet of Things (SIOT)","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/660278","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/660278","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE International Workshop on Secure Internet of Things (SIoT), Luxembourg, 26 September 2019","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/660278","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/660278","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE International Workshop on Secure Internet of Things (SIoT), Luxembourg, 26 September 2019","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320291","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W157156687","https://openalex.org/W174184838","https://openalex.org/W790201181","https://openalex.org/W1483823906","https://openalex.org/W1577297395","https://openalex.org/W1586677474","https://openalex.org/W1871925091","https://openalex.org/W1921864689","https://openalex.org/W1987761485","https://openalex.org/W2004584049","https://openalex.org/W2050853996","https://openalex.org/W2058869529","https://openalex.org/W2075827176","https://openalex.org/W2104473821","https://openalex.org/W2110238111","https://openalex.org/W2545823459","https://openalex.org/W2590339106","https://openalex.org/W2597472131","https://openalex.org/W2783045275","https://openalex.org/W2794772989","https://openalex.org/W2883971886","https://openalex.org/W2888321432","https://openalex.org/W2898385488","https://openalex.org/W2929832674","https://openalex.org/W2934945105","https://openalex.org/W2942132945","https://openalex.org/W3151828992","https://openalex.org/W4206807714","https://openalex.org/W6606430823"],"related_works":["https://openalex.org/W1978034799","https://openalex.org/W2062583373","https://openalex.org/W4384518368","https://openalex.org/W2007984522","https://openalex.org/W2141388993","https://openalex.org/W2155353733","https://openalex.org/W2504659933","https://openalex.org/W2039943835","https://openalex.org/W2293245356","https://openalex.org/W2560421591"],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,69,129],"Unmanned":[3],"Aerial":[4],"Vehicles":[5],"(UAVs)":[6],"embedded":[7],"with":[8,126],"vulnerable":[9],"monolithic":[10],"software,":[11],"involving":[12],"concurrency":[13],"and":[14,61,78,83,113],"fragile":[15],"communication":[16,103],"links,":[17],"has":[18],"recently":[19],"raised":[20],"serious":[21],"concerns":[22],"about":[23],"their":[24],"security.":[25],"Recent":[26],"studies":[27],"show":[28,123],"that":[29],"a":[30,35,39],"2kg":[31],"UAV":[32,47,102,108,136],"can":[33],"cause":[34],"critical":[36],"damage":[37],"to":[38,59,88,100],"passenger":[40],"jet":[41],"windscreen.":[42],"However,":[43],"verifying":[44],"security":[45,90,132],"in":[46,73,92,134,138],"software":[48,70,76,137],"based":[49],"on":[50,118],"traditional":[51],"testing":[52],"remains":[53],"an":[54],"open":[55],"challenge":[56],"mainly":[57],"due":[58],"scalability":[60],"deployment":[62],"issue.":[63],"Here":[64],"we":[65],"investigate":[66,96],"the":[67,101,127,139],"application":[68],"verication":[71],"techniques;":[72],"particular,":[74],"existing":[75],"analyzers":[77],"veriers,":[79],"which":[80],"implement":[81],"fuzzing":[82],"bounded":[84],"model":[85],"checking":[86],"techniques,":[87],"detect":[89],"vulnerabilities":[91,133],"typical":[93],"UAVs.We":[94],"also":[95],"fragility":[97],"aspects":[98],"related":[99],"link":[104],"since":[105],"all":[106],"remaining":[107],"components":[109],"(e.g.,":[110],"position,":[111],"velocity":[112],"attitude":[114],"control)":[115],"heavily":[116],"depend":[117],"it.":[119],"Our":[120],"preliminary":[121],"results":[122],"real":[124],"cyber-threats":[125],"possibility":[128],"exploiting":[130],"further":[131],"real-world":[135],"foreseeable":[140],"future.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
