DefenseDrone

La seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos aso...

Full description

Autores:
Mena Toledo, Soraya Azucena
Nuñez Briñez, Yuly Katherin
Lopez Estepa, Victor Julio
Tipo de recurso:
https://purl.org/coar/resource_type/c_7a1f
Fecha de publicación:
2025
Institución:
Universidad El Bosque
Repositorio:
Repositorio U. El Bosque
Idioma:
spa
OAI Identifier:
oai:repositorio.unbosque.edu.co:20.500.12495/14847
Acceso en línea:
https://hdl.handle.net/20.500.12495/14847
Palabra clave:
Seguridad en IoT
Raspberry Pi
Drones
Ciberseguridad
Mitigación de riesgos
Manual de seguridad
621.3820289
IoT Security
Raspberry Pi
Drones
Cybersecurity
Risk mitigation
Security Manual
Rights
License
Attribution-NonCommercial-ShareAlike 4.0 International
id UNBOSQUE2_1b09d5d895614e84f11a09f8dde88508
oai_identifier_str oai:repositorio.unbosque.edu.co:20.500.12495/14847
network_acronym_str UNBOSQUE2
network_name_str Repositorio U. El Bosque
repository_id_str
dc.title.none.fl_str_mv DefenseDrone
dc.title.translated.none.fl_str_mv DefenseDrone
title DefenseDrone
spellingShingle DefenseDrone
Seguridad en IoT
Raspberry Pi
Drones
Ciberseguridad
Mitigación de riesgos
Manual de seguridad
621.3820289
IoT Security
Raspberry Pi
Drones
Cybersecurity
Risk mitigation
Security Manual
title_short DefenseDrone
title_full DefenseDrone
title_fullStr DefenseDrone
title_full_unstemmed DefenseDrone
title_sort DefenseDrone
dc.creator.fl_str_mv Mena Toledo, Soraya Azucena
Nuñez Briñez, Yuly Katherin
Lopez Estepa, Victor Julio
dc.contributor.advisor.none.fl_str_mv Castro Gutierrez, Robert Dario
dc.contributor.author.none.fl_str_mv Mena Toledo, Soraya Azucena
Nuñez Briñez, Yuly Katherin
Lopez Estepa, Victor Julio
dc.contributor.orcid.none.fl_str_mv Mena Toledo, Soraya Azucena [0009-0007-5127-9813]
Nuñez Briñez, Yuly Katherin [0009-0000-5721-3793]
Lopez Estepa, Victor Julio [0009-0009-8627-4646]
dc.subject.none.fl_str_mv Seguridad en IoT
Raspberry Pi
Drones
Ciberseguridad
Mitigación de riesgos
Manual de seguridad
topic Seguridad en IoT
Raspberry Pi
Drones
Ciberseguridad
Mitigación de riesgos
Manual de seguridad
621.3820289
IoT Security
Raspberry Pi
Drones
Cybersecurity
Risk mitigation
Security Manual
dc.subject.ddc.none.fl_str_mv 621.3820289
dc.subject.keywords.none.fl_str_mv IoT Security
Raspberry Pi
Drones
Cybersecurity
Risk mitigation
Security Manual
description La seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos asociados al uso de Raspberry Pi como plataforma de procesamiento en drones de alto desempeño. Para ello, se realiza un análisis de las vulnerabilidades críticas presentes en el hardware, el sistema operativo, las comunicaciones y el firmware, así como de los posibles vectores de ataque. A partir de este análisis, se establecen recomendaciones técnicas para su mitigación. Finalmente, se desarrolla una guía de buenas prácticas en seguridad, que abarca aspectos clave como la configuración del sistema operativo en Raspberry Pi, la protección de la red de comunicaciones, la integridad del hardware y el aseguramiento del firmware. El presente documento contribuye al fortalecimiento de la seguridad en entornos de aeronaves no tripuladas, minimizando las amenazas que puedan comprometer la disponibilidad e integridad del sistema.
publishDate 2025
dc.date.accessioned.none.fl_str_mv 2025-07-01T19:38:56Z
dc.date.available.none.fl_str_mv 2025-07-01T19:38:56Z
dc.date.issued.none.fl_str_mv 2025-06
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.local.spa.fl_str_mv Tesis/Trabajo de grado - Monografía - Especialización
dc.type.coar.none.fl_str_mv https://purl.org/coar/resource_type/c_7a1f
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/bachelorThesis
dc.type.coarversion.none.fl_str_mv https://purl.org/coar/version/c_ab4af688f83e57aa
format https://purl.org/coar/resource_type/c_7a1f
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12495/14847
dc.identifier.instname.spa.fl_str_mv instname:Universidad El Bosque
dc.identifier.reponame.spa.fl_str_mv reponame:Repositorio Institucional Universidad El Bosque
dc.identifier.repourl.none.fl_str_mv repourl:https://repositorio.unbosque.edu.co
url https://hdl.handle.net/20.500.12495/14847
identifier_str_mv instname:Universidad El Bosque
reponame:Repositorio Institucional Universidad El Bosque
repourl:https://repositorio.unbosque.edu.co
dc.language.iso.fl_str_mv spa
language spa
dc.relation.references.none.fl_str_mv [1] Imdad Ali Shah, Cybersecurity Issues and Challenges in the Drone Industry. IGI Global, 2024. doi: 10.4018/979-8-3693-0774-8.
[2] V. Sihag, G. Choudhary, P. Choudhary, and N. Dragoni, “Cyber4Drone: A Systematic Review of Cyber Security and Forensics.
[3] Zapata German and Garcia Rodolfo, “CyberDrone_a_cybersecurity_platform_for_drone_atta,” 2021.
[4] J. Sainz-Raso, S. Martin, G. Diaz, and M. Castro, “Security Vulnerabilities in Raspberry Pi-Analysis of the System Weaknesses,” IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47–52, Nov. 2019, doi: 10.1109/MCE.2019.2941347.
[5] Y. Renu and V. Sarveshwaran, “A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs),” Inteligencia Artificial, vol. 28, no. 75, pp. 199–219, Jun. 2025, doi: 10.4114/intartif.vol28iss75pp199-219.
[6] N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 223–230. doi: 10.1016/j.procs.2023.09.031.
[7] S. Benhadhria, M. Mansouri, A. Benkhlifa, I. Gharbi, and N. Jlili, “VAGADRONE: Intelligent and fully automatic drone based on raspberry Pi and android,” Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, doi: 10.3390/app11073153.
[8] Cañizarez Juan, “Analisis y replicación de vulnerabilidades en Raspberry Pi3,” Universidad de los Andes, 2022.
[9] G. Talmale, S. S. Mane, and G. R. Talmale, “Raspberry Pi Based Security System On IoT Platform,” no. 5, pp. 17–20, 2017, [Online]. Available: http://www.ijritcc.org.
[10] R. Pi and J. López García, “PRON: Diseño y construcción de un dron basado en,” Universat Oberta de Catalunya, 2020.
[11] A. R. H. Gutiérrez, M. A. T. Duarte, R. G. France, and Reaxión. R. arbitrada de divulgación científica de la U. T. de León., “El uso de drones en ciencias de la tierra.,” Jan. 2017.
[12] I. Juan, C. Castelo, I. J. Marcelo, and P. Ramos, “Estudio de viabilidad técnica del Raspberry Pi para su uso en sistemas de visión artificial,” Sep. 30, 2020. Accessed: May 13, 2025. [Online]. Available: https://revista.estudioidea.org/ojs/index.php/mj/article/view/125.
[13] A. Amazon, “¿Qué es la ciberseguridad? - Explicación de la ciberseguridad - AWS.” Accessed: May 13, 2025. [Online]. Available: https://aws.amazon.com/es/what-is/cybersecurity/.
[14] N. Mansourov and D. Campara, “Knowledge of vulnerabilities as an element of cybersecurity argument,” System Assurance, pp. 147–170, 2011, doi: 10.1016/B978-0-12-381414-2.00006-3.
[15] R. Subramaniam, A. J. Sheela, and A. Alwabli, “Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique,” Ain Shams Engineering Journal, vol. 16, no. 7, p. 103400, Jul. 2025, doi: 10.1016/J.ASEJ.2025.103400.
[16] S. Furber, Arm system on a chip Architecture. 2000.
[17] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” Feb. 2007, doi: 10.6028/NIST.SP.800-94.
[18] Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, vol. 6, pp. 43203–43212, Aug. 2018, doi: 10.1109/ACCESS.2018.2863237.
[19] NIST National Vulnerability Database, “NVD - CVEs and the NVD Process.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/general/cve-process.
[20] D. L. Evans and K. H. Brown, “FIPS 197 Federal Information Processing Standards Publication Advanced Encryption Standard (AES)”, doi: 10.6028/NIST.FIPS.197-upd1.
[21] A. Maleki, H. H. Nguyen, E. Bedeer, and R. Barton, “A Tutorial on Chirp Spread Spectrum for LoRaWAN: Basics and Key Advances,” 2023.
[22] MITRE ATT&CK, “Pre-OS Boot: Bootkit, Sub-technique T1542.003 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1542/003/.
[23] The U-Boot development community, “The U-Boot Documentation — Das U-Boot unknown version documentation.” Accessed: May 14, 2025. [Online]. Available: https://docs.u-boot.org/en/latest/.
[24] E. Marchetti, T. Waheed, and A. Calabro, “Cybersecurity Testing in Drones domain: A Systematic Literature Review,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3495994.
[25] Del Cairo Hector, Sarmiento Diego, and Mendieta Deyanira, “Fortalecimiento de la seguridad en wifi,” Universidad El Bosque, 2024.
[26] Rick. Golden, Raspberry Pi Networking cookbook : connect your Raspberry Pi to the world with this essential collection of recipes for basic administration and common network services. Packt Publishing, 2016.
[27] NIST National Vulnerability Database, “NVD - CVE-2020-14001.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-14001.
[28] NIST National Vulnerability Database, “NVD - CVE-2019-13173.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2019-13173.
[29] NIST National Vulnerability Database, “NVD - cve-2021-3156.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-3156.
[30] NIST National Vulnerability Database, “NVD - cve-2021-4034.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-4034.
[31] NIST National Vulnerability Database, “NVD - cve-2018-15473.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2018-15473.
[32] NIST National Vulnerability Database, “NVD - cve-2020-15778.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2020-15778.
[33] NIST National Vulnerability Database, “NVD - cve-2019-14287.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2019-14287.
[34] Mitre ATT&CK, “Boot or Logon Autostart Execution, Technique T1547 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1547/.
[35] NIST National Vulnerability Database, “NVD - CVE-2020-10281.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10281.
[36] NIST National Vulnerability Database, “NVD - CVE-2020-10282.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10282.
[37] NIST National Vulnerability Database, “NVD - CVE-2020-10283.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10283.
[38] NIST National Vulnerability Database, “NVD - CVE-2020-24572.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-24572.
dc.rights.en.fl_str_mv Attribution-NonCommercial-ShareAlike 4.0 International
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rights.local.spa.fl_str_mv Acceso abierto
dc.rights.accessrights.none.fl_str_mv https://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Attribution-NonCommercial-ShareAlike 4.0 International
http://creativecommons.org/licenses/by-nc-sa/4.0/
Acceso abierto
https://purl.org/coar/access_right/c_abf2
http://purl.org/coar/access_right/c_abf2
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.program.spa.fl_str_mv Especialización en Seguridad de Redes Telemáticas
dc.publisher.grantor.spa.fl_str_mv Universidad El Bosque
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
institution Universidad El Bosque
bitstream.url.fl_str_mv https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/93de57ff-83b4-4092-ba43-b962038318aa/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/b549c296-ba58-4936-96e7-6b3e3dacfba4/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3fcdd53b-af07-4e72-a3de-929d797912c9/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/56cca764-9431-4857-8cf6-3027af00fd56/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3975d8fc-6dde-4a47-8c19-2a6faaa4ecb9/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/976ac95f-8f94-454a-a0fb-1f9d5f98a055/download
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/923c74fc-3dbd-45e2-9c79-38745629ad90/download
bitstream.checksum.fl_str_mv a21c6e95ef2f362b14011626ecd54dd8
17cc15b951e7cc6b3728a574117320f9
b23ea4dfdbebef419b8931422b406a38
86ddab6056c12ebc1eef47d3c5df1220
5643bfd9bcf29d560eeec56d584edaa9
aaab78e89afe2a406c6005034b7fca9a
86a1e50fca3ca2f52f66f5766f2c0573
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad El Bosque
repository.mail.fl_str_mv bibliotecas@biteca.com
_version_ 1849967284173406208
spelling Castro Gutierrez, Robert DarioMena Toledo, Soraya AzucenaNuñez Briñez, Yuly KatherinLopez Estepa, Victor JulioMena Toledo, Soraya Azucena [0009-0007-5127-9813]Nuñez Briñez, Yuly Katherin [0009-0000-5721-3793]Lopez Estepa, Victor Julio [0009-0009-8627-4646]2025-07-01T19:38:56Z2025-07-01T19:38:56Z2025-06https://hdl.handle.net/20.500.12495/14847instname:Universidad El Bosquereponame:Repositorio Institucional Universidad El Bosquerepourl:https://repositorio.unbosque.edu.coLa seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos asociados al uso de Raspberry Pi como plataforma de procesamiento en drones de alto desempeño. Para ello, se realiza un análisis de las vulnerabilidades críticas presentes en el hardware, el sistema operativo, las comunicaciones y el firmware, así como de los posibles vectores de ataque. A partir de este análisis, se establecen recomendaciones técnicas para su mitigación. Finalmente, se desarrolla una guía de buenas prácticas en seguridad, que abarca aspectos clave como la configuración del sistema operativo en Raspberry Pi, la protección de la red de comunicaciones, la integridad del hardware y el aseguramiento del firmware. El presente documento contribuye al fortalecimiento de la seguridad en entornos de aeronaves no tripuladas, minimizando las amenazas que puedan comprometer la disponibilidad e integridad del sistema.Especialista en Seguridad de Redes TelemáticasEspecializaciónThe security at commercial drone's control systems it's a critical aspect due their growing integration of embedded hardware, in example the Raspberry PI devices, at architectural level. The present document purpose an identification plan over the vulnerabilities, analysis and mitigation of risks associated to the use of Raspberry PI as control platform on high performance drones. to this a deep analysis of the critical vulnerabilities at hardware level is done, as well as Operative System, communications and firmware, as the possible attack vectors. Based on this analysis, some recommendations are highlighted in order to mitigate these risks. Finally, a security best practices guide is developed, covering key aspects such as configuring the operating system on the Raspberry Pi, securing the communications network, ensuring hardware integrity, and securing firmware. This document contributes to strengthening security in unmanned aircraft environments, minimizing threats that could compromise system availability and integrity.application/pdfAttribution-NonCommercial-ShareAlike 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-sa/4.0/Acceso abiertohttps://purl.org/coar/access_right/c_abf2http://purl.org/coar/access_right/c_abf2Seguridad en IoTRaspberry PiDronesCiberseguridadMitigación de riesgosManual de seguridad621.3820289IoT SecurityRaspberry PiDronesCybersecurityRisk mitigationSecurity ManualDefenseDroneDefenseDroneEspecialización en Seguridad de Redes TelemáticasUniversidad El BosqueFacultad de IngenieríaTesis/Trabajo de grado - Monografía - Especializaciónhttps://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesishttps://purl.org/coar/version/c_ab4af688f83e57aa[1] Imdad Ali Shah, Cybersecurity Issues and Challenges in the Drone Industry. IGI Global, 2024. doi: 10.4018/979-8-3693-0774-8.[2] V. Sihag, G. Choudhary, P. Choudhary, and N. Dragoni, “Cyber4Drone: A Systematic Review of Cyber Security and Forensics.[3] Zapata German and Garcia Rodolfo, “CyberDrone_a_cybersecurity_platform_for_drone_atta,” 2021.[4] J. Sainz-Raso, S. Martin, G. Diaz, and M. Castro, “Security Vulnerabilities in Raspberry Pi-Analysis of the System Weaknesses,” IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47–52, Nov. 2019, doi: 10.1109/MCE.2019.2941347.[5] Y. Renu and V. Sarveshwaran, “A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs),” Inteligencia Artificial, vol. 28, no. 75, pp. 199–219, Jun. 2025, doi: 10.4114/intartif.vol28iss75pp199-219.[6] N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 223–230. doi: 10.1016/j.procs.2023.09.031.[7] S. Benhadhria, M. Mansouri, A. Benkhlifa, I. Gharbi, and N. Jlili, “VAGADRONE: Intelligent and fully automatic drone based on raspberry Pi and android,” Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, doi: 10.3390/app11073153.[8] Cañizarez Juan, “Analisis y replicación de vulnerabilidades en Raspberry Pi3,” Universidad de los Andes, 2022.[9] G. Talmale, S. S. Mane, and G. R. Talmale, “Raspberry Pi Based Security System On IoT Platform,” no. 5, pp. 17–20, 2017, [Online]. Available: http://www.ijritcc.org.[10] R. Pi and J. López García, “PRON: Diseño y construcción de un dron basado en,” Universat Oberta de Catalunya, 2020.[11] A. R. H. Gutiérrez, M. A. T. Duarte, R. G. France, and Reaxión. R. arbitrada de divulgación científica de la U. T. de León., “El uso de drones en ciencias de la tierra.,” Jan. 2017.[12] I. Juan, C. Castelo, I. J. Marcelo, and P. Ramos, “Estudio de viabilidad técnica del Raspberry Pi para su uso en sistemas de visión artificial,” Sep. 30, 2020. Accessed: May 13, 2025. [Online]. Available: https://revista.estudioidea.org/ojs/index.php/mj/article/view/125.[13] A. Amazon, “¿Qué es la ciberseguridad? - Explicación de la ciberseguridad - AWS.” Accessed: May 13, 2025. [Online]. Available: https://aws.amazon.com/es/what-is/cybersecurity/.[14] N. Mansourov and D. Campara, “Knowledge of vulnerabilities as an element of cybersecurity argument,” System Assurance, pp. 147–170, 2011, doi: 10.1016/B978-0-12-381414-2.00006-3.[15] R. Subramaniam, A. J. Sheela, and A. Alwabli, “Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique,” Ain Shams Engineering Journal, vol. 16, no. 7, p. 103400, Jul. 2025, doi: 10.1016/J.ASEJ.2025.103400.[16] S. Furber, Arm system on a chip Architecture. 2000.[17] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” Feb. 2007, doi: 10.6028/NIST.SP.800-94.[18] Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, vol. 6, pp. 43203–43212, Aug. 2018, doi: 10.1109/ACCESS.2018.2863237.[19] NIST National Vulnerability Database, “NVD - CVEs and the NVD Process.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/general/cve-process.[20] D. L. Evans and K. H. Brown, “FIPS 197 Federal Information Processing Standards Publication Advanced Encryption Standard (AES)”, doi: 10.6028/NIST.FIPS.197-upd1.[21] A. Maleki, H. H. Nguyen, E. Bedeer, and R. Barton, “A Tutorial on Chirp Spread Spectrum for LoRaWAN: Basics and Key Advances,” 2023.[22] MITRE ATT&CK, “Pre-OS Boot: Bootkit, Sub-technique T1542.003 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1542/003/.[23] The U-Boot development community, “The U-Boot Documentation — Das U-Boot unknown version documentation.” Accessed: May 14, 2025. [Online]. Available: https://docs.u-boot.org/en/latest/.[24] E. Marchetti, T. Waheed, and A. Calabro, “Cybersecurity Testing in Drones domain: A Systematic Literature Review,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3495994.[25] Del Cairo Hector, Sarmiento Diego, and Mendieta Deyanira, “Fortalecimiento de la seguridad en wifi,” Universidad El Bosque, 2024.[26] Rick. Golden, Raspberry Pi Networking cookbook : connect your Raspberry Pi to the world with this essential collection of recipes for basic administration and common network services. Packt Publishing, 2016.[27] NIST National Vulnerability Database, “NVD - CVE-2020-14001.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-14001.[28] NIST National Vulnerability Database, “NVD - CVE-2019-13173.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2019-13173.[29] NIST National Vulnerability Database, “NVD - cve-2021-3156.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-3156.[30] NIST National Vulnerability Database, “NVD - cve-2021-4034.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-4034.[31] NIST National Vulnerability Database, “NVD - cve-2018-15473.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2018-15473.[32] NIST National Vulnerability Database, “NVD - cve-2020-15778.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2020-15778.[33] NIST National Vulnerability Database, “NVD - cve-2019-14287.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2019-14287.[34] Mitre ATT&CK, “Boot or Logon Autostart Execution, Technique T1547 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1547/.[35] NIST National Vulnerability Database, “NVD - CVE-2020-10281.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10281.[36] NIST National Vulnerability Database, “NVD - CVE-2020-10282.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10282.[37] NIST National Vulnerability Database, “NVD - CVE-2020-10283.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10283.[38] NIST National Vulnerability Database, “NVD - CVE-2020-24572.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-24572.spaORIGINALTrabajo de grado.pdfTrabajo de grado.pdfapplication/pdf9039107https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/93de57ff-83b4-4092-ba43-b962038318aa/downloada21c6e95ef2f362b14011626ecd54dd8MD59trueAnonymousREADLICENSElicense.txtlicense.txttext/plain; charset=utf-82000https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/b549c296-ba58-4936-96e7-6b3e3dacfba4/download17cc15b951e7cc6b3728a574117320f9MD55falseAnonymousREADCarta de autorizacion.pdfapplication/pdf266331https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3fcdd53b-af07-4e72-a3de-929d797912c9/downloadb23ea4dfdbebef419b8931422b406a38MD511falseBiblioteca - (Publicadores)READAnexo 1 Acta de Sustentacion.pdfapplication/pdf592747https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/56cca764-9431-4857-8cf6-3027af00fd56/download86ddab6056c12ebc1eef47d3c5df1220MD512falseBiblioteca - (Publicadores)READCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-81160https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3975d8fc-6dde-4a47-8c19-2a6faaa4ecb9/download5643bfd9bcf29d560eeec56d584edaa9MD510falseAnonymousREADTEXTTrabajo de grado.pdf.txtTrabajo de grado.pdf.txtExtracted texttext/plain101388https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/976ac95f-8f94-454a-a0fb-1f9d5f98a055/downloadaaab78e89afe2a406c6005034b7fca9aMD513falseAnonymousREADTHUMBNAILTrabajo de grado.pdf.jpgTrabajo de grado.pdf.jpgGenerated Thumbnailimage/jpeg3045https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/923c74fc-3dbd-45e2-9c79-38745629ad90/download86a1e50fca3ca2f52f66f5766f2c0573MD514falseAnonymousREAD20.500.12495/14847oai:pruebas-update-repositorio-unbosque.cloudbiteca.com:20.500.12495/148472025-07-02T10:06:32.237Zhttp://creativecommons.org/licenses/by-nc-sa/4.0/Attribution-NonCommercial-ShareAlike 4.0 Internationalopen.accesshttps://pruebas-update-repositorio-unbosque.cloudbiteca.comRepositorio Institucional Universidad El Bosquebibliotecas@biteca.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