A spotlight on security and privacy risks with future household robots: attacks and lessons
暂无分享,去创建一个
Tadayoshi Kohno | Joshua R. Smith | Karl Koscher | Cynthia Matuszek | Tamara Denning | Cynthia Matuszek | Karl Koscher | Tamara Denning | Tadayoshi Kohno
[1] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[2] Kai Wang,et al. Reconsidering physical key secrecy: teleduplication via optical decoding , 2008, CCS.
[3] Henrik I. Christensen,et al. "My Roomba Is Rambo": Intimate Home Appliances , 2007, UbiComp.
[4] Sebastian Thrun,et al. A Personal Account of the Development of Stanley, the Robot That Won the DARPA Grand Challenge , 2006, AI Mag..
[5] Ronald C. Arkin. Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture - Part 2: Formalization for Ethical Control , 2008, AGI.
[6] Jodi Forlizzi,et al. How robotic products become social products: An ethnographic study of cleaning in the home , 2007, 2007 2nd ACM/IEEE International Conference on Human-Robot Interaction (HRI).
[7] C.D. Kidd,et al. Designing a sociable robot system forweight maintenance , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[8] Ronald C. Arkin,et al. Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part I: Motivation and philosophy , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).
[9] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[10] Zhiwei Luo,et al. Development of the Tactile Sensor System of a Human-Interactive Robot “RI-MAN” , 2008, IEEE Transactions on Robotics.
[11] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[12] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[13] W. Keith Edwards,et al. At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.
[14] Michael Fleming,et al. Team Cornell's Skynet: Robust perception and planning in an urban environment , 2008 .
[15] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[16] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[17] Susan Leigh Anderson,et al. Asimov’s “three laws of robotics” and machine metaethics , 2008, AI & SOCIETY.
[18] Peter King,et al. Odin: Team VictorTango's entry in the DARPA Urban Challenge , 2008, J. Field Robotics.
[19] Brian Scassellati,et al. The Grand Challenges in Socially Assistive Robotics , 2007 .
[20] D. Voth. A new generation of military robots , 2004, IEEE Intelligent Systems.
[21] Y. F. Yong,et al. Robot Safety , 1985 .
[22] Jean Scholtz,et al. Common metrics for human-robot interaction , 2006, HRI '06.
[23] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[24] Changchun Liu,et al. Affect Recognition in Robot Assisted Rehabilitation of Children with Autism Spectrum Disorder , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[25] Sebastian Thrun,et al. Stanley: The robot that won the DARPA Grand Challenge , 2006, J. Field Robotics.
[26] Nicolas Schweighofer,et al. ADAPT - adaptive automated robotic task practice system for stroke rehabilitation , 2008, 2008 IEEE International Conference on Robotics and Automation.
[27] Roger Clarke,et al. Asimov's Laws of Robotics: Implications for Information Technology - Part 2 , 1993, Computer.
[28] Charles E. Frank,et al. Evaluation of Google hacking , 2008, InfoSecCD2008 2008.
[29] D. Voth. Biotracking gives back to nature , 2004, IEEE Intelligent Systems.
[30] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[31] Ehud Sharlin,et al. Toward Acceptable Domestic Robots: Applying Insights from Social Psychology , 2009, Int. J. Soc. Robotics.