Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417249
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Wibowo et al (2017) investigated the Architectural Vulnerability Factor (AVF) of all major in-core memory structures of an out-of-order superscalar processor while Sultana and Williams (2017) used micro patterns detect vulnerability in software. Ziems and Wu (2021) and Paradis et al, (2018) modelled test as a source code and used it for software vulnerability detection in natural language processing (NLP), Han et al (2019) proposed a static detection model, while Choi et al (2020) developed Cyber-Physical Inconsistency to target vulnerability detection in Robotic Vehicles (RVs).…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Wibowo et al (2017) investigated the Architectural Vulnerability Factor (AVF) of all major in-core memory structures of an out-of-order superscalar processor while Sultana and Williams (2017) used micro patterns detect vulnerability in software. Ziems and Wu (2021) and Paradis et al, (2018) modelled test as a source code and used it for software vulnerability detection in natural language processing (NLP), Han et al (2019) proposed a static detection model, while Choi et al (2020) developed Cyber-Physical Inconsistency to target vulnerability detection in Robotic Vehicles (RVs).…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…At a high level, PlanFuzz follows an evolutionary testing framework, which is widely adopted by prior works on domain-specific vulnerability discovery with high generality, effectiveness, and efficiency [21,26,[87][88][89]. To address the challenges in §III-B, the following key designs are introduced:…”
Section: A Overview Of Key Designsmentioning
confidence: 99%
“…Compared to AD systems, RVs typically follow the control commands sent by a base station without the need to make planning decisions by itself based on the surrounding environment. Thus, existing works concentrate on designs to find control-specific vulnerabilities [25,26,28] or highly rely on control-specific knowledge [27,138], which are thus orthogonal to the design challenges we need to address for discovering semantic vulnerabilities for BP in the AD context.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If lessons are not learned and robot producers do not prioritize security today, it will come back to haunt them later [25]. Robots are exposed to a variety of vulnerabilities [30], [31] which can impair their connection, efficiency, procedures, and reliability. Multiple flaws in the operation of robots can render them dangerous to humans.…”
Section: Introductionmentioning
confidence: 99%