References
- Alert (ICS-ALERT-17-073-01A). MEMS Accelerometer Hardware Design Flaws (Update A), (Apr. 11, 2017); http://bit.ly/2CjTdcD.Google Scholar
- Analog Devices Advisory to ICS-ALERT-17-073-01 (Apr. 2017); http://bit.ly/2EPF9cc.Google Scholar
- Arndt, D. Alaskan North Slope climate change just outran one of our tools to measure it. (Dec. 6, 2017); http://bit.ly/2AFNBJz.Google Scholar
- Foo Kune, D. et al. Ghost Talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA), May 2013. Google Scholar
Digital Library
- Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of Network and Distributed System Security Symposium (NDSS), The Internet Society, 2011.Google Scholar
- Fu, K. Pacemaker recall exposes national need for research and education in embedded security. In Computing Community Consortium (CCC), (Sept. 2017); http://bit.ly/2xBEqel.Google Scholar
- Liu, J., Yan, C., and Xu, W. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles. In DEFCON24 (Aug. 2016); http://bit.ly/2EQNOLs.Google Scholar
- Neumann, P.G. Fundamental trustworthiness principles. In New Solutions for Cybersecurity. In MIT Press/Connection Science, H. Shrobe, D. Shrier, A. Pentland, Eds., Cambridge, MA, 2018.Google Scholar
- Nguyen, T. Cumulative interference to aircraft radios from multiple portable electronic devices. In IEEE Conference on Digital Avionics Systems, 2005.Google Scholar
Cross Ref
- Parnas, D.L. Education for computing professionals. In IEEE Computer 23, 1 (Jan. 1990), 17--22. Google Scholar
Digital Library
- Parnas, D.L. Software engineering programmes are not computer science programmes. In Annals of Software Engineering 6 (1998), 19--37. (Reprinted in IEEE Software (Nov./Dec. 1999), 19--30. Google Scholar
Digital Library
- Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium, (Aug. 2010). Google Scholar
Digital Library
- Son, S. et al. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of USENIX Security Symposium (Aug. 2015). Google Scholar
Digital Library
- Trippel, T. et al. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of IEEE European Symposium on Security and Privacy (Euro S&P), (Apr. 2017), http://bit.ly/2Cl2KQn.Google Scholar
- Zhang, G. et al. DolphinAttack: Inaudible voice commands. In Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2017. Google Scholar
Digital Library
Index Terms
Risks of trusting the physics of sensors





Comments