For my thesis we did research about the security of the MAVLink protocol, focussed on implementation flaws.

In the meantime we studied the suitability of the fuzzing technique as a complementing method for security analysis. Four our setup, we used the SITL environment with a quadcopter.

Resulting from the research, our first findings resulted in 15 unique floating point exceptions (crashing the simulator), generated at different places in the implementation. I know FPE are not allowed during flight with a real drone, but maybe they can be an indication some other flaws still exist.

I would like to share and discuss my findings, is this forum the correct place or is there someone particular I need to contact?

Best regards,


Views: 232

Reply to This

Replies to This Discussion


Thank you for the reply, I will mention it there.



Reply to Discussion



Season Two of the Trust Time Trial (T3) Contest 
A list of all T3 contests is here. The current round, the Vertical Horizontal one, is here

© 2020   Created by Chris Anderson.   Powered by

Badges  |  Report an Issue  |  Terms of Service