Security Researchers from Johns Hopkins University are interested in learning what security flaws off the shelf consumer drones, like the DJI Phantom 3, have and how they can be exploited. In their research, they have crashed many drones and learned a few key ways to exploit holes in the connection between the drone and its remote control. First, they were able to cause the drone to crash by sending thousands of connection requests to the drone in quick succession. Second, the were able to crash the drone by sending a very large data packet to the drone. This data packet exceeded the drone’s memory and again, the drone crashed. Finally, they were able to spoof the drone’s controls and again, cause a crash. Their hope is that these tests will lead to fixing security holes in the software that runs and controls the drones.
Spread the love