Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
DepthCloak: Projecting Optical Camouflage Patches for Erroneous Monocular Depth Estimation of Vehicles
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2739–2747https://doi.org/10.1145/3664647.3681474Adhesive adversarial patches have been common used in attacks against the computer vision task of monocular depth estimation (MDE). Compared to physical patches permanently attached to target objects, optical projection patches show great flexibility and ...
- research-articleOctober 2022
Defending Physical Adversarial Attack on Object Detection via Adversarial Patch-Feature Energy
MM '22: Proceedings of the 30th ACM International Conference on MultimediaPages 1905–1913https://doi.org/10.1145/3503161.3548362Object detection plays an important role in security-critical systems such as autonomous vehicles but has shown to be vulnerable to adversarial patch attacks. Existing defense methods are restricted to localized noise patches by removing noisy regions ...
- research-articleJune 2021
TRAITOR: A Low-Cost Evaluation Platform for Multifault Injection
ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and SystemsPages 51–56https://doi.org/10.1145/3457340.3458303Fault injection is a well-known method to physically attack embedded systems, microcontrollers in particular. It aims to find and exploit vulnerabilities in the hardware to induce malfunction in the software and eventually bypass software security or ...
- research-articleNovember 2019
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices
IoT S&P'19: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-ThingsPages 2–7https://doi.org/10.1145/3338507.3358614The wide deployment of devices in Internet of Things (IoT) not only brings many benefits, but also incurs some security challenges. Remote attestation becomes an attractive method to guarantee the security of IoT devices. Unfortunately, most current ...
- research-articleMay 2019
Protecting mobile devices from physical memory attacks with targeted encryption
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 34–44https://doi.org/10.1145/3317549.3319721Sensitive data in a process could be scattered over the memory of a computer system for a prolonged period of time. Unfortunately, DRAM chips were proven insecure in previous studies. The problem becomes worse in the mobile environment, in which users' ...
- short-paperNovember 2017
Developing Models for Physical Attacks in Cyber-Physical Systems
CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCyPages 49–55https://doi.org/10.1145/3140241.3140249In this paper, we analyze the security of cyber-physical systems using the ADversary VIew Security Evaluation (ADVISE) meta modeling approach, taking into consideration the effects of physical attacks. To build our model of the system, we construct an ...