1 |
Roy, Nirupam, et al. "Inaudible voice commands: The long-range attack and defense." 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). 2018.
|
2 |
Davidson, Drew, et al. "Controlling UAVs with sensor input spoofing attacks." 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). 2016.
|
3 |
Shoukry, Yasser, et al. "Pycra: Physical challenge-response authentication foractive sensors under spoofing attacks." Proceedings of the 22nd ACMSIGSAC Conference on Computer and Communications Security. 2015.
|
4 |
Petit, Jonathan, et al. "Remote attacks on automated vehicles sensors: Experiments on camera and lidar." Black Hat Europe 11 (2015):2015.
|
5 |
Chen Yan et.al, "Can You Trust Autonomous Vehicles: Contactless Attacks against Sensorsof Self-driving Vehicle", DEF CON 2016
|
6 |
Son, Yunmok, et al. "Rocking drones with intentional sound noise on gyroscopic sensors." 24th {USENIX} Security Symposium ({USENIX} Security 15). 2015.
|
7 |
Trippel, Timothy, et al. "WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks." 2017 IEEE European symposium on security and privacy (EuroS&P). IEEE, 2017.
|
8 |
Shin, Hocheol, et al. "Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications." International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, 2017
|
9 |
Cao, Yulong, et al. "Adversarial sensor attack on lidar-based perception in autonomous driving." Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019.
|
10 |
Lee, Sunwoo, Wonsuk Choi, and Dong Hoon Lee. "Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model." IEEE Access 7 (2019): 107716-107729.
DOI
|