Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

[HTML][HTML] Review of intentional electromagnetic interference on UAV sensor modules and experimental study

SG Kim, E Lee, IP Hong, JG Yook - Sensors, 2022 - mdpi.com
With the advancement of technology, Unmanned Aerial Vehicles (UAVs), also known as
drones, are being used in numerous applications. However, the illegal use of UAVs, such as …

{SAVIOR}: Securing autonomous vehicles with robust physical invariants

R Quinonez, J Giraldo, L Salazar, E Bauman… - 29th USENIX security …, 2020 - usenix.org
Autonomous Vehicles (AVs), including aerial, sea, and ground vehicles, assess their
environment with a variety of sensors and actuators that allow them to perform specific tasks …

That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency

Y Man, R Muller, M Li, ZB Celik, R Gerdes - 32nd USENIX Security …, 2023 - usenix.org
Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the
environment and predict the trajectory of surrounding objects for planning purposes. An …

Sok: A minimalist approach to formalizing analog sensor security

C Yan, H Shin, C Bolton, W Xu… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Over the last six years, several papers demonstrated how intentional analog interference
based on acoustics, RF, lasers, and other physical modalities could induce faults, influence …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Taxonomy and challenges of out-of-band signal injection attacks and defenses

I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …

Trick or heat? Manipulating critical temperature-based control systems using rectification attacks

Y Tu, S Rampazzi, B Hao, A Rodriguez, K Fu… - Proceedings of the 2019 …, 2019 - dl.acm.org
Temperature sensing and control systems are widely used in the closed-loop control of
critical processes such as maintaining the thermal stability of patients, or in alarm systems …

Challenges of future high power wireless power transfer for light-duty electric vehicles----technology and risk management

B Zhang, RB Carlson, JG Smart, EJ Dufek, B Liaw - Etransportation, 2019 - Elsevier
Wireless power transfer is a state-of-the-art technology with the advantage of convenience
and flexibility, as well as the capability of enabling fully automated charging. With power …

Security and privacy in the emerging cyber-physical world: A survey

Z Yu, Z Kaplan, Q Yan, N Zhang - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …