{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:36:29Z","timestamp":1775745389145,"version":"3.50.1"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179371","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1807-1821","source":"Crossref","is-referenced-by-count":29,"title":["mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array"],"prefix":"10.1109","author":[{"given":"Rohith","family":"Reddy Vennam","sequence":"first","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]},{"given":"Ish Kumar","family":"Jain","sequence":"additional","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]},{"given":"Kshitiz","family":"Bansal","sequence":"additional","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]},{"given":"Joshua","family":"Orozco","sequence":"additional","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]},{"given":"Puja","family":"Shukla","sequence":"additional","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]},{"given":"Aanjhan","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA"}]},{"given":"Dinesh","family":"Bharadia","sequence":"additional","affiliation":[{"name":"University of California San Diego,La Jolla,CA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2007.914635"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2011.2178427"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430783"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC55140.2022.9922457"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2978507"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900120"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.133"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2018.2889045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700450"},{"issue":"9","key":"ref10","first-page":"369","article-title":"Tesla autopilot: semi autonomous driving, an uptick for future autonomy","volume":"3","author":"Ingle","year":"2016","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3171293"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700455"},{"key":"ref13","volume-title":"Principles and applications of millimeter-wave radar.","author":"Currie","year":"1987"},{"key":"ref14","article-title":"Security in automotive radar and vehicular networks","author":"Yeh","year":"2016","journal-title":"submitted to Microwave Journal"},{"key":"ref15","article-title":"Fmcw radar jamming techniques and analysis","volume-title":"Tech. Rep.","author":"Chen","year":"2013"},{"key":"ref16","volume-title":"Modern communications jamming principles and techniques.","author":"Poisel","year":"2011"},{"issue":"8","key":"ref17","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Def Con"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963481"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP51882.2021.9408835"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2016.7790406"},{"key":"ref21","first-page":"1196","article-title":"Detection of malicious ais position spoofing by exploiting radar information","volume-title":"proceedings of the 16th international conference on information fusion","author":"Katsilieris"},{"key":"ref22","volume-title":"A platform for false data injection in frequency modulated continuous wave radar.","author":"Chauhan","year":"2014"},{"key":"ref23","article-title":"Demonstration of a false-data injection attack against an fmcw radar","author":"Chauhan","year":"2014","journal-title":"Embedded Security in Cars (ESCAR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359567"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00252-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3474376.3487283"},{"key":"ref27","author":"Ordean","year":"2022","journal-title":"Millimeter-wave automotive radar spoofing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-022-00838-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2628914"},{"key":"ref30","article-title":"Programming chirp parameters in ti radar devices","volume-title":"Application Report SWRA553","author":"Dham","year":"2017"},{"key":"ref31","article-title":"Radarbook2"},{"key":"ref32","article-title":"Extreme waves"},{"key":"ref33","article-title":"Turtle bot"},{"key":"ref34","article-title":"Programming chirp parameters in ti radar devices"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185453"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/IRS.2018.8448017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062241"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690734"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076287"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RWS50353.2021.9360393"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s22062145"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3115804"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2908214"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351077"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2006.890223"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2953305"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3004275"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037705"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948775"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485935"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484766"},{"key":"ref55","author":"Sitawarin","year":"2018","journal-title":"Darts: Deceiving autonomous cars with toxic signs"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00033"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/s21062140"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179371.pdf?arnumber=10179371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:09Z","timestamp":1721452449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179371","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}