1 |
I. Giechaskiel and K. Rasmussen, "Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 645-670, Firstquarter. 2020.
DOI
|
2 |
Y. Shoukry, P. Martin, Y. Yona, S. Diggavi, and M. Srivastava, "PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks," Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1004-1015, Oct. 2015.
|
3 |
D. Davidson, H. Wu, and R. Jellinek, "Controlling UAVs with Sensor Input Spoofing Attacks," 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), Aug. 2016.
|
4 |
T. Chen, L. Shangguan, Z. Li, and K. Jamieson, "Metamorph: Injecting inaudible commands into over-the-air voice controlled systems," Proceedings of NDSS, Feb. 2020.
|
5 |
R.N. Dean, G.T. Flowers, A.S. Hodel, G. Roth, S. Castro, R. Zhou, A. Moreira, A. Ahmed, R. Rifki, B.E. Grantham, D. Bittle, and J. Brunsch, "On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise," IEEE International Symposium on Industrial Electronics, pp. 1435-1440, Jun. 2017.
|
6 |
J. Selvaraj, G.Y. Dayanikli, N.P. Gaunkar, D. Ware, R.M. Gerdes, and M. Mina, "Electromagnetic Induction Attacks Against Embedded Systems," Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 499-510, May. 2018.
|
7 |
T. Trippel, O. Weisse, W. Xu, P. Honeyman, and K. Fu, "WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks," IEEE European Symposium on Security and Privacy (EuroS&P), pp. 3-18, April. 2017.
|
8 |
H. Shin, D. Kim, Y. Kwon, and Y. Kim, "Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications," In International Conference on Cryptographic Hardware and Embedded Systems, vol. 10529, pp. 445-467, 2017.
|
9 |
C. Yan, W. Xu, and J. Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle," DEFCON, 2016.
|
10 |
Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, "Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors," In 24th {USENIX} Security Symposium, pp. 881-896, Aug. 2015.
|
11 |
Y. Tu, Z. Lin, I. Lee, and X. Hei, "Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors," In 27th {USENIX} Security Symposium, pp. 1545-1562, Aug. 2018.
|
12 |
Y. Tu, S. Rampazzi, B. Hao, A. Rodriguez, and K. Fu, "Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks," Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2301-2315, Nov. 2019.
|
13 |
Google "MPU-6000 and MPU-6050 Product Specification Revision 3.4," https://invensense.tdk.com/wp-content/uploads/2015/02/MPU-6000-Datasheet1.pdf, May. 2021.
|
14 |
Y. Ashibani and Q.H. Mahmoud, "Cyber physical systems security: Analysis, challenges and solutions," Computers & Security, vol. 68, pp. 81-97, July. 2017.
DOI
|
15 |
Google "HC-SR04 module Datasheet," https://cdn.sparkfun.com/datasheets/Sensors/Proximity/HCSR04.pdf, May. 2021.
|
16 |
R.E. Blake, "Basic Vibration Theory," Shock and Vibration Handbook, New York, NY, USA:McGraw Hill, 1988.
|