opinion
Public Access

Risks of trusting the physics of sensors

Online:23 January 2018Publication History

Abstract

Protecting the Internet of Things with embedded security.

References

  1. Alert (ICS-ALERT-17-073-01A). MEMS Accelerometer Hardware Design Flaws (Update A), (Apr. 11, 2017); http://bit.ly/2CjTdcD.Google ScholarGoogle Scholar
  2. Analog Devices Advisory to ICS-ALERT-17-073-01 (Apr. 2017); http://bit.ly/2EPF9cc.Google ScholarGoogle Scholar
  3. Arndt, D. Alaskan North Slope climate change just outran one of our tools to measure it. (Dec. 6, 2017); http://bit.ly/2AFNBJz.Google ScholarGoogle Scholar
  4. Foo Kune, D. et al. Ghost Talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA), May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of Network and Distributed System Security Symposium (NDSS), The Internet Society, 2011.Google ScholarGoogle Scholar
  6. Fu, K. Pacemaker recall exposes national need for research and education in embedded security. In Computing Community Consortium (CCC), (Sept. 2017); http://bit.ly/2xBEqel.Google ScholarGoogle Scholar
  7. Liu, J., Yan, C., and Xu, W. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles. In DEFCON24 (Aug. 2016); http://bit.ly/2EQNOLs.Google ScholarGoogle Scholar
  8. Neumann, P.G. Fundamental trustworthiness principles. In New Solutions for Cybersecurity. In MIT Press/Connection Science, H. Shrobe, D. Shrier, A. Pentland, Eds., Cambridge, MA, 2018.Google ScholarGoogle Scholar
  9. Nguyen, T. Cumulative interference to aircraft radios from multiple portable electronic devices. In IEEE Conference on Digital Avionics Systems, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  10. Parnas, D.L. Education for computing professionals. In IEEE Computer 23, 1 (Jan. 1990), 17--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Parnas, D.L. Software engineering programmes are not computer science programmes. In Annals of Software Engineering 6 (1998), 19--37. (Reprinted in IEEE Software (Nov./Dec. 1999), 19--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium, (Aug. 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Son, S. et al. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of USENIX Security Symposium (Aug. 2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Trippel, T. et al. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of IEEE European Symposium on Security and Privacy (Euro S&P), (Apr. 2017), http://bit.ly/2Cl2KQn.Google ScholarGoogle Scholar
  15. Zhang, G. et al. DolphinAttack: Inaudible voice commands. In Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Risks of trusting the physics of sensors

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      Communications of the ACM cover image
      Communications of the ACM  Volume 61, Issue 2
      February 2018
      94 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3181977
      • Editor:
      • Andrew A. Chien
      Issue’s Table of Contents

      Copyright © 2018 Owner/Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Online: 23 January 2018
      • Published: 23 January 2018

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!