Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
opinion
Public Access

Risks of trusting the physics of sensors

Published: 23 January 2018 Publication History

Abstract

Protecting the Internet of Things with embedded security.

References

[1]
Alert (ICS-ALERT-17-073-01A). MEMS Accelerometer Hardware Design Flaws (Update A), (Apr. 11, 2017); http://bit.ly/2CjTdcD.
[2]
Analog Devices Advisory to ICS-ALERT-17-073-01 (Apr. 2017); http://bit.ly/2EPF9cc.
[3]
Arndt, D. Alaskan North Slope climate change just outran one of our tools to measure it. (Dec. 6, 2017); http://bit.ly/2AFNBJz.
[4]
Foo Kune, D. et al. Ghost Talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA), May 2013.
[5]
Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of Network and Distributed System Security Symposium (NDSS), The Internet Society, 2011.
[6]
Fu, K. Pacemaker recall exposes national need for research and education in embedded security. In Computing Community Consortium (CCC), (Sept. 2017); http://bit.ly/2xBEqel.
[7]
Liu, J., Yan, C., and Xu, W. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles. In DEFCON24 (Aug. 2016); http://bit.ly/2EQNOLs.
[8]
Neumann, P.G. Fundamental trustworthiness principles. In New Solutions for Cybersecurity. In MIT Press/Connection Science, H. Shrobe, D. Shrier, A. Pentland, Eds., Cambridge, MA, 2018.
[9]
Nguyen, T. Cumulative interference to aircraft radios from multiple portable electronic devices. In IEEE Conference on Digital Avionics Systems, 2005.
[10]
Parnas, D.L. Education for computing professionals. In IEEE Computer 23, 1 (Jan. 1990), 17--22.
[11]
Parnas, D.L. Software engineering programmes are not computer science programmes. In Annals of Software Engineering 6 (1998), 19--37. (Reprinted in IEEE Software (Nov./Dec. 1999), 19--30.
[12]
Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium, (Aug. 2010).
[13]
Son, S. et al. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of USENIX Security Symposium (Aug. 2015).
[14]
Trippel, T. et al. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of IEEE European Symposium on Security and Privacy (Euro S&P), (Apr. 2017), http://bit.ly/2Cl2KQn.
[15]
Zhang, G. et al. DolphinAttack: Inaudible voice commands. In Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2017.

Cited By

View all
  • (2025)A Self-Check Method for Enhancing the Measurement Accuracy of Analog Sensors Under Electromagnetic InterferenceIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2025.352904774(1-13)Online publication date: 2025
  • (2024)Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and EducationSensors10.3390/s2412392324:12(3923)Online publication date: 17-Jun-2024
  • (2024)Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor AttackProceedings of the ACM Web Conference 202410.1145/3589334.3645612(3031-3042)Online publication date: 13-May-2024
  • Show More Cited By

Index Terms

  1. Risks of trusting the physics of sensors

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 61, Issue 2
    February 2018
    94 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3181977
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 January 2018
    Published in CACM Volume 61, Issue 2

    Check for updates

    Qualifiers

    • Opinion
    • Popular
    • Un-reviewed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)633
    • Downloads (Last 6 weeks)137
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)A Self-Check Method for Enhancing the Measurement Accuracy of Analog Sensors Under Electromagnetic InterferenceIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2025.352904774(1-13)Online publication date: 2025
    • (2024)Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and EducationSensors10.3390/s2412392324:12(3923)Online publication date: 17-Jun-2024
    • (2024)Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor AttackProceedings of the ACM Web Conference 202410.1145/3589334.3645612(3031-3042)Online publication date: 13-May-2024
    • (2024)Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance ModelIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.343982225:11(19073-19087)Online publication date: 1-Nov-2024
    • (2024)Adversarial Computer Vision via Acoustic Manipulation of Camera SensorsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.333461821:4(3734-3750)Online publication date: 1-Jul-2024
    • (2024)Noise Resilient Learning for Attack Detection in Smart Grid PMU InfrastructureIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.322328821:2(618-635)Online publication date: Mar-2024
    • (2024)From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00231(2366-2384)Online publication date: 19-May-2024
    • (2024)Work in Progress: Emerging from Shadows: Optimal Hidden Actuator Attack to Cyber-Physical Systems2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS)10.1109/RTAS61025.2024.00044(406-409)Online publication date: 13-May-2024
    • (2024)Data-Driven Electromagnetic Susceptibility Modeling Method for Analog SensorsIEEE Sensors Journal10.1109/JSEN.2024.337056524:8(12560-12569)Online publication date: 15-Apr-2024
    • (2024)Let’s Get Cyber-Physical: Validation of Safety-Critical Cyber-Physical SystemsIEEE Access10.1109/ACCESS.2024.347021612(142569-142581)Online publication date: 2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media