Non-invasive Spoofing Attacks for Anti-lock Braking Systems

Author:

Shoukry Yasser,Martin Paul,Tabuada Paulo,Srivastava Mani

Publisher

Springer Berlin Heidelberg

Reference13 articles.

1. Fawzi, H., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 337–344 (September 2011)

2. Cárdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC 2008, pp. 6:1–6:6. USENIX Association, Berkeley (2008)

3. Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Computers and Security 25(7), 498–506 (2006)

4. Dorfler, F., Pasqualetti, F., Bullo, F.: Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach. In: Allerton, Allerton, IL, USA, September 2011, pp. 1486–1491 (2011)

5. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, pp. 6–6. USENIX Association, Berkeley (2011)

Cited by 166 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2024-08-22

2. Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution;IEEE Transactions on Dependable and Secure Computing;2024-07

3. Enhancing Security in Connected and Autonomous Vehicles: A Pairing Approach and Machine Learning Integration;Applied Sciences;2024-06-28

4. Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection;2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS);2024-05-13

5. Thinking Beyond Bus-off: Targeted Control Falsification in CAN;2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS);2024-05-13

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3