Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Aviation

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 105

Full-Text Articles in Law

Two Heads Are Better Than One: Single Pilot Operation Threatens The Safety Of The Friendly Skies, Alexandria E. Rook May 2024

Two Heads Are Better Than One: Single Pilot Operation Threatens The Safety Of The Friendly Skies, Alexandria E. Rook

Arkansas Law Review

Boeing’s Maneuvering Characteristics Augmentation System (“MCAS”), an automated piloting system, is only supposed to handle aircraft operations in very specific circumstances. Despite devasting results with MCAS, Boeing has another automated piloting system on the horizon that poses even more grave risks: Single Pilot Operation (“SPO”). Boeing—along


Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon Feb 2024

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon

National Training Aircraft Symposium (NTAS)

This proposal centers on the development of a Concept of Operations in Advanced Air Mobility (AAM). Kent State University's College of Aeronautics and Engineering is poised to pioneer the integration of drones and electric Vertical Takeoff and Landing (eVTOL) systems, bridging the gap between its campus and airport by transporting students and faculty the 3NM distance from campus to the airport and back by a UAV. Beyond a standard research initiative, this proposal signifies a groundbreaking effort to reshape the landscape of educational aeronautics and Advanced Air Mobility and Urban Air Mobility. Our overarching goal is to transcend conventional boundaries …


Ground Risk Model For Uavs, Andrew V. Shelley Jan 2023

Ground Risk Model For Uavs, Andrew V. Shelley

International Journal of Aviation, Aeronautics, and Aerospace

This paper develops an alternative to the ground risk model provided by JARUS SORA. Key inconsistencies in the SORA ground risk model are identified, specifically ground risk continuing to increase when there is no further increase in fatality probability.

Population density is a critical component of UAS ground risk. Definitions of population density adopted by various regulatory jurisdictions are reviewed. A categorisation of population density is developed based on official statistics categories for New Zealand. This categorisation is more granular than that provided by SORA, enabling a more nuanced assessment of risk.

A ground risk model is then developed using …


Pre-Check Security Processes In Selected Brazil Airports- Changes And Gains, Camila Miliani, Fabio Sanches, Jonatta Haniere, Rodrigo Cortes, Tais Gargano, Vanessa Reis Dec 2022

Pre-Check Security Processes In Selected Brazil Airports- Changes And Gains, Camila Miliani, Fabio Sanches, Jonatta Haniere, Rodrigo Cortes, Tais Gargano, Vanessa Reis

Student Works

The recommendation of this Research Project is to implement the precheck program at 10 Airports in Brazil with more than 5 million passengers a year. The passengers’ satisfaction, security improvement and OPEX savings would be a reality.

The expectation of OPEX savings at these 10 Airports are R$ 3.360.000,00 per year, (US$ 634.000,00) due to the possibility of using the current infrastructure and yet, reduce one Protection Agent per inspection module, per airport.

The research topic was to understand the feasibility of implementing the precheck security process in Brazil Airports. Using the U.S. benchmark, and the current Brazilian legislation, GYN …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price Dec 2022

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


The Potential Impact Of A Voluntary Non-Punitive Self Report Program Under The Scope Of The Brazilian Civil Aviation Authority, Audrey Gonzalez, Bráullio Amaral, Felipe Piton, Laércio De Araujo, Marcelo Marcusso Nov 2021

The Potential Impact Of A Voluntary Non-Punitive Self Report Program Under The Scope Of The Brazilian Civil Aviation Authority, Audrey Gonzalez, Bráullio Amaral, Felipe Piton, Laércio De Araujo, Marcelo Marcusso

Student Works

The key recommendation from this study is to purpose the Brazilian National Civil Aviation Authority evaluation over the implementation of a new voluntary and non-punitive safety reporting program, with a different scope from the current one. The voluntary self-reporting programs in place in the USA, Europe and Australia should be used as a regulatory reference and the program development and implementation should be executed in close coordination with the different industry stakeholders.

To access if the current Brazilian State Safety reporting system meets ICAO requirements, the researchers accessed pertinent aviation safety regulatory legislation. Additionally, to access if the current Brazilian …


Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George Jan 2021

Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George

Beyond: Undergraduate Research Journal

Remotely controlled small aircraft, otherwise known as Unmanned Aircraft Systems (UAS) or drones have started to impact the United States National Airspace System by interfering with the safe flight of aircraft. As the UAS industry continues its expected growth into the future, lawmakers, as well as regulators at the Federal Aviation Administration (FAA) and the aviation community must be able to predict when there will be more UAS craft in the air that could cause an interruption to air traffic so that more resources can be allocated optimally to counter the threat of UAS craft. The purpose of this study …


Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker May 2020

Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker

Student Works

Few studies have been conducted that have truly considered the relevance and inadequacies of applicable aircraft rescue and firefighting (ARFF) regulations. Fewer still have studied and explored accident cases that directly exemplify the deficiencies and inconsistencies of various regulatory standards and requirements. This study seeks to expose and explain those inadequacies by utilizing a historical, case-study type research method to examine accident cases during which time the governing regulations played a significant role in the ARFF operations. The findings discovered as a result of this multi-case analysis provide evidence that the current regulations governing United States ARFF operations are both …


Uas For Public Safety Operations: A Comparison Of Uas Point Clouds To Terrestrial Lidar Point Cloud Data Using A Faro Scanner, Joseph S. Cerreta, Scott S. Burgess, Jeremy Coleman Jan 2020

Uas For Public Safety Operations: A Comparison Of Uas Point Clouds To Terrestrial Lidar Point Cloud Data Using A Faro Scanner, Joseph S. Cerreta, Scott S. Burgess, Jeremy Coleman

International Journal of Aviation, Aeronautics, and Aerospace

Unmanned Aircraft Systems (UAS) can be useful tools for public safety agencies during crime or vehicle accident scene investigations if it can provide value to the resource-constrained agency. The speed of data collection, while minimizing first responder risk, while sustaining an acceptable level of accuracy and precision compared to other tools is where the agency may find value. During a recent homicide investigation in Florida, a UAS provided saved 81% in law enforcement labor hours with an acceptable level of accuracy compared to traditional methods. The purpose of this research was to compare UAS to determine if there were differences …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka Jan 2019

Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka

Publications

With the evolution of the workforce and the growing needs of the aviation industry, a clear need for concrete sustainability initiatives and actions have emerged. Sustainability in this sense becomes a matter of survival. For this reason, in this chapter, we will attempt to close three gaps in current sustainability studies: Theory vs practice, intention vs behavior, and education vs workplace.

Our purpose is to develop a ‘simple’ strategy for integrating all three pillars of sustainability into STEM HE programs that create authentic engagement and real buy-in from the students that are then replicated in the workplace. Based on the …


Assessment And Comparison Of Aviation Manufacturing Industries Throughout Mexico And Brazil, Omar E. Morsi, Kelly A. Whealan-George, Aaron D. Clevenger Aug 2018

Assessment And Comparison Of Aviation Manufacturing Industries Throughout Mexico And Brazil, Omar E. Morsi, Kelly A. Whealan-George, Aaron D. Clevenger

Aaron D. Clevenger

This literature review serves to provide insight and understanding in regards to the evolving aviation manufacturing industry throughout the globe and more specifically, Mexico and Brazil. Increased demand for aircraft units both in the commercial and private sectors have led to unprecedented expansions in aircraft manufacturing across the industry. In order to illuminate certain potentials and current growth levels of such industries, this review will delve into an array of information and specifications in regards to economic, political, and cultural influences throughout both Mexican and Brazilian markets respectively. In conclusion, the review will identify the transformation of an aviation manufacturing …


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.