Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 2Article No.: 14, Pages 1–27https://doi.org/10.1145/3596221In vision-based object recognition systems, imaging sensors perceive the environment and then objects are detected and classified for decision-making purposes, e.g., to maneuver an automated vehicle around an obstacle or to raise alarms for intruders in ...
- research-articleAugust 2023
That person moves like a car: misclassification attack detection for autonomous systems using spatiotemporal consistency
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumAugust 2023, Article No.: 388, Pages 6929–6946Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the environment and predict the trajectory of surrounding objects for planning purposes. An ODT's output contains object classes and tracks that are traditionally ...
- research-articleNovember 2022
Physical Hijacking Attacks against Object Trackers
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2022, Pages 2309–2322https://doi.org/10.1145/3548606.3559390Modern autonomous systems rely on both object detection and object tracking in their visual perception pipelines. Although many recent works have attacked the object detection component of autonomous vehicles, these attacks do not work on full pipelines ...
- doctoral_thesisJanuary 2022
Attacks and Defenses on Autonomous Vehicles: From Sensor Perception to Control Area Networks
AbstractAutonomous driving has been a focus in both industry and academia. The autonomous vehicle decision-making pipeline is typically comprised of several modules from perceiving the physical world to interacting with it. The perception module aims to ...
- research-articleJuly 2020
SVM: secure vehicle motion verification with a single wireless receiver
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile NetworksJuly 2020, Pages 65–76https://doi.org/10.1145/3395351.3399348Connected vehicles leverage wireless interfaces to broadcast their motion state information for improved traffic safety and efficiency. It is crucial for their motion claims (location and velocity) to be verified at the receivers to detect spoofing ...
- research-articleDecember 2019
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferenceDecember 2019, Pages 229–244https://doi.org/10.1145/3359789.3359834The Controller Area Network (CAN) is a bus standard commonly used in the automotive industry for connecting Electronic Control Units (ECUs) within a vehicle. The broadcast nature of this protocol, along with the lack of authentication or strong ...
- research-articleJanuary 2016
Secure Routing Based on Social Similarity in Opportunistic Networks
IEEE Transactions on Wireless Communications (TWC), Volume 15, Issue 1Jan. 2016, Pages 594–605https://doi.org/10.1109/TWC.2015.2476466The lack of pre-existing infrastructure or dynamic topology makes it impossible to establish end-to-end connections in opportunistic networks (OppNets). Instead, a store-and-forward strategy can be employed. However, such loosely knit routing paths depend ...