Proceedings of the 54th Annual Design Automation Conference 2017 2017
DOI: 10.1145/3061639.3062241
|View full text |Cite
|
Sign up to set email alerts
|

Estimation of Safe Sensor Measurements of Autonomous System Under Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…As a side note, we would like to emphasize that using the proposed physical layer cyberattack detection system implemented at the firmware level, together with a prediction based cyberattack detector implemented at higher layers may result improved cyberattack resilience. As a related work, we also would like to cite References [16,17] where a modulation based PyCRA system is proposed. Although the techniques developed in References [15][16][17] are applicable to many different sensors, they are all based on turning of the sensor's physical output signal off at random instants/periods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a side note, we would like to emphasize that using the proposed physical layer cyberattack detection system implemented at the firmware level, together with a prediction based cyberattack detector implemented at higher layers may result improved cyberattack resilience. As a related work, we also would like to cite References [16,17] where a modulation based PyCRA system is proposed. Although the techniques developed in References [15][16][17] are applicable to many different sensors, they are all based on turning of the sensor's physical output signal off at random instants/periods.…”
Section: Introductionmentioning
confidence: 99%
“…As a related work, we also would like to cite References [16,17] where a modulation based PyCRA system is proposed. Although the techniques developed in References [15][16][17] are applicable to many different sensors, they are all based on turning of the sensor's physical output signal off at random instants/periods. For better cyberattack detection, sensor's physical output must be turned on for shorter and randomly selected periods of time.…”
Section: Introductionmentioning
confidence: 99%
“…In [16], [17], physical-layer attacks on automotive radar sensors are discussed. The first one is based on estimators and the second one is based on a technique called spatiotemporal challenge-response (STCR) which does not depend on an estimation model.…”
Section: Introductionmentioning
confidence: 99%
“…In a good engineering design, both physicallayer and communication layer (if exists) attack detectors should be used to improve safety and reliability. In this work, we focus on physical-layer attacks described in [2], and our approach is inspired by [16], [18]. Finally, the author would like to cite [19]- [21] as related published results.…”
Section: Introductionmentioning
confidence: 99%
“…Under the real-time MCU control, the replica-radar quickly synchronizes with the target radar to provide distance-spoofing capability. This kind of radar spoofing attack has been studied so far only in either simulations or low-frequency model-based studies [1][2][3]. Other related works [4,5] only focus on how to make object electro-magnetically invisible by using an EM absorber.…”
Section: Introductionmentioning
confidence: 99%