skip to main content
opinion
Public Access

Risks of trusting the physics of sensors

Published:23 January 2018Publication History
Skip Abstract Section

Abstract

Protecting the Internet of Things with embedded security.

References

  1. Alert (ICS-ALERT-17-073-01A). MEMS Accelerometer Hardware Design Flaws (Update A), (Apr. 11, 2017); http://bit.ly/2CjTdcD.Google ScholarGoogle Scholar
  2. Analog Devices Advisory to ICS-ALERT-17-073-01 (Apr. 2017); http://bit.ly/2EPF9cc.Google ScholarGoogle Scholar
  3. Arndt, D. Alaskan North Slope climate change just outran one of our tools to measure it. (Dec. 6, 2017); http://bit.ly/2AFNBJz.Google ScholarGoogle Scholar
  4. Foo Kune, D. et al. Ghost Talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA), May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of Network and Distributed System Security Symposium (NDSS), The Internet Society, 2011.Google ScholarGoogle Scholar
  6. Fu, K. Pacemaker recall exposes national need for research and education in embedded security. In Computing Community Consortium (CCC), (Sept. 2017); http://bit.ly/2xBEqel.Google ScholarGoogle Scholar
  7. Liu, J., Yan, C., and Xu, W. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles. In DEFCON24 (Aug. 2016); http://bit.ly/2EQNOLs.Google ScholarGoogle Scholar
  8. Neumann, P.G. Fundamental trustworthiness principles. In New Solutions for Cybersecurity. In MIT Press/Connection Science, H. Shrobe, D. Shrier, A. Pentland, Eds., Cambridge, MA, 2018.Google ScholarGoogle Scholar
  9. Nguyen, T. Cumulative interference to aircraft radios from multiple portable electronic devices. In IEEE Conference on Digital Avionics Systems, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  10. Parnas, D.L. Education for computing professionals. In IEEE Computer 23, 1 (Jan. 1990), 17--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Parnas, D.L. Software engineering programmes are not computer science programmes. In Annals of Software Engineering 6 (1998), 19--37. (Reprinted in IEEE Software (Nov./Dec. 1999), 19--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium, (Aug. 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Son, S. et al. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of USENIX Security Symposium (Aug. 2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Trippel, T. et al. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of IEEE European Symposium on Security and Privacy (Euro S&P), (Apr. 2017), http://bit.ly/2Cl2KQn.Google ScholarGoogle Scholar
  15. Zhang, G. et al. DolphinAttack: Inaudible voice commands. In Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Risks of trusting the physics of sensors

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 61, Issue 2
      February 2018
      94 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3181977
      Issue’s Table of Contents

      Copyright © 2018 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 January 2018

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format