SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
暂无分享,去创建一个
Jairo Giraldo | Alvaro A. Cárdenas | Erick Bauman | Raul Quinonez | Zhiqiang Lin | Luis E. Salazar | Zhiqiang Lin | A. Cárdenas | J. Giraldo | Raul Quinonez | Erick Bauman
[1] Erik Blasch,et al. Unmanned vehicles come of age: The DARPA grand challenge , 2006, Computer.
[2] Pieter H. Hartel,et al. Through the eye of the PLC: semantic security monitoring for industrial processes , 2014, ACSAC.
[3] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Wen-Chuan Lee,et al. Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach , 2018, CCS.
[5] Carlos Murguia,et al. Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.
[6] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[7] T D Gillespie,et al. Fundamentals of Vehicle Dynamics , 1992 .
[8] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[9] John S. Baras,et al. Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.
[10] Yongdae Kim,et al. Tractor Beam , 2019, ACM Trans. Priv. Secur..
[11] Jairo Giraldo,et al. Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems , 2019, ACNS.
[12] Chen Wang,et al. Trajectory Tracking Control for Quadrotor Robot Subject to Payload Variation and Wind Gust Disturbance , 2016, Journal of Intelligent & Robotic Systems.
[13] Ľuboš Chovanec,et al. Mathematical Modelling and Parameter Identification of Quadrotor (a survey) , 2014 .
[14] M. J. Caruso,et al. Applications of magnetic sensors for low cost compass systems , 2000, IEEE 2000. Position Location and Navigation Symposium (Cat. No.00CH37062).
[15] Kasper Bonne Rasmussen,et al. Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses , 2019, IEEE Communications Surveys & Tutorials.
[16] Mikel Iturbe,et al. Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems , 2018, CCS.
[17] Zdzisław Gosiewski,et al. Kalman Filter Realization for Orientation and Position Estimation on Dedicated Processor , 2014 .
[18] Frank L. Lewis,et al. Aircraft control and simulation: Dynamics, controls design, and autonomous systems: Third edition , 2015 .
[19] Saman A. Zonouz,et al. CPAC: securing critical infrastructure with cyber-physical access control , 2016, ACSAC.
[20] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[21] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[22] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[23] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[24] Henrik Sandberg,et al. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018, ACM Comput. Surv..
[25] Gang Wang,et al. All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.
[26] S. Nash,et al. Linear and Nonlinear Optimization , 2008 .
[27] Thomas F. Coleman,et al. An Interior Trust Region Approach for Nonlinear Minimization Subject to Bounds , 1993, SIAM J. Optim..
[28] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[29] Francesco Borrelli,et al. Kinematic and dynamic vehicle models for autonomous driving control design , 2015, 2015 IEEE Intelligent Vehicles Symposium (IV).
[30] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[31] Carlos Murguia,et al. CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).
[32] Insup Lee,et al. Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors , 2018, USENIX Security Symposium.
[33] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[34] Francesco Borrelli,et al. Autonomous drifting with onboard sensors , 2016 .
[35] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.
[36] Kevin Fu,et al. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.
[37] T. Humphreys,et al. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .
[38] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[39] Jorge J. Moré,et al. The Levenberg-Marquardt algo-rithm: Implementation and theory , 1977 .
[40] Mani Mina,et al. Electromagnetic Induction Attacks Against Embedded Systems , 2018, AsiaCCS.