{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:02:43Z","timestamp":1778788963761,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The New Energy and Industrial Technology Development Organization (NEDO)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196506","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"511-524","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Sensor CON-Fusion"],"prefix":"10.1145","author":[{"given":"Shoei","family":"Nashimoto","sequence":"first","affiliation":[{"name":"Mitsubishi Electric, Kamakura, Japan"}]},{"given":"Daisuke","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric, Kamakura, Japan"}]},{"given":"Takeshi","family":"Sugawara","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Choufu, Japan"}]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Choufu, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium. 513--530","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands .. In USENIX Security Symposium. 513--530 . Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands.. In USENIX Security Symposium. 513--530."},{"key":"e_1_3_2_1_2_1","volume-title":"A platform for false data injection in frequency modulated continuous wave radar","author":"Chauhan Ruchir","unstructured":"Ruchir Chauhan . 2014. A platform for false data injection in frequency modulated continuous wave radar . Utah State University . Ruchir Chauhan. 2014. A platform for false data injection in frequency modulated continuous wave radar. Utah State University."},{"key":"e_1_3_2_1_3_1","unstructured":"Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks. WOOT.   Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks. WOOT."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/7.845216"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2009.4939502"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463312000331"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2008.2004486"},{"key":"e_1_3_2_1_10_1","volume-title":"False Data Injection Attacks in Control Systems. In First Workshop on Secure Control Systems.","author":"Mo Yilin","year":"2010","unstructured":"Yilin Mo and Bruno Sinopoli . 2010 . False Data Injection Attacks in Control Systems. In First Workshop on Secure Control Systems. Yilin Mo and Bruno Sinopoli. 2010. False Data Injection Attacks in Control Systems. In First Workshop on Secure Control Systems."},{"key":"e_1_3_2_1_11_1","unstructured":"Young-Seok Park Yunmok Son Hocheol Shin Dohyun Kim and Yongdae Kim. 2016. This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. WOOT.   Young-Seok Park Yunmok Son Hocheol Shin Dohyun Kim and Yongdae Kim. 2016. This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. WOOT."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185453"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings. The Second IEEE and ACM International Symposium on. IEEE, 268--269","author":"Roetenberg Daniel","year":"2003","unstructured":"Daniel Roetenberg , Henk Luinge , and Peter Veltink . 2003 . Inertial and magnetic sensing of human movement near ferromagnetic materials Mixed and Augmented Reality, 2003 . Proceedings. The Second IEEE and ACM International Symposium on. IEEE, 268--269 . Daniel Roetenberg, Henk Luinge, and Peter Veltink. 2003. Inertial and magnetic sensing of human movement near ferromagnetic materials Mixed and Augmented Reality, 2003. Proceedings. The Second IEEE and ACM International Symposium on. IEEE, 268--269."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2005.847353"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2006.889184"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1999.772597"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2006.875664"},{"key":"e_1_3_2_1_18_1","unstructured":"NXP Semiconductors. 2016 a. AN5023 - Sensor Fusion Kalman Filters.  NXP Semiconductors. 2016 a. AN5023 - Sensor Fusion Kalman Filters."},{"key":"e_1_3_2_1_19_1","unstructured":"NXP Semiconductors. 2016 b. IoT Sensing Software Development Kit: Embedded Software Framework. (2016). https:\/\/www.nxp.com\/support\/developer-resources\/software-development-tools\/sensor-developer-resources\/sensor-toolbox-sensor-development-ecosystem\/iot-sensing-software-development-kit-embedded-software-framework:IOT-SENSING-SDK Retrieved December 15 2017 from tempurl  NXP Semiconductors. 2016 b. IoT Sensing Software Development Kit: Embedded Software Framework. (2016). https:\/\/www.nxp.com\/support\/developer-resources\/software-development-tools\/sensor-developer-resources\/sensor-toolbox-sensor-development-ecosystem\/iot-sensing-software-development-kit-embedded-software-framework:IOT-SENSING-SDK Retrieved December 15 2017 from tempurl"},{"key":"e_1_3_2_1_20_1","unstructured":"NXP Semiconductors. 2016 c. Sensor Toolbox Development Platform for FXAS21002C and FXOS8700C 9-Axis Solution. (2016). http:\/\/www.nxp.com\/products\/developer-resources\/hardware-development-tools\/freedom-development-boards\/sensor-toolbox-development-platform-for-fxas21002c-and-fxos8700c-9-axis-solution:FRDM-STBC-AGM01 Retrieved December 15 2017 from tempurl  NXP Semiconductors. 2016 c. Sensor Toolbox Development Platform for FXAS21002C and FXOS8700C 9-Axis Solution. (2016). http:\/\/www.nxp.com\/products\/developer-resources\/hardware-development-tools\/freedom-development-boards\/sensor-toolbox-development-platform-for-fxas21002c-and-fxos8700c-9-axis-solution:FRDM-STBC-AGM01 Retrieved December 15 2017 from tempurl"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_22_1","volume-title":"Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium. 881--896","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Young-Seok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , Yongdae Kim , 2015 . Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium. 881--896 . Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim, et almbox.. 2015. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium. 881--896."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ciza Thomas (Ed.).. 2011. Sensor Fusion - Foundation and Applications. InTech.  Ciza Thomas (Ed.).. 2011. Sensor Fusion - Foundation and Applications. InTech.","DOI":"10.5772\/680"},{"key":"e_1_3_2_1_24_1","volume-title":"2017 IEEE European Symposium on. IEEE, 3--18","author":"Trippel Timothy","year":"2017","unstructured":"Timothy Trippel , Ofir Weisse , Wenyuan Xu , Peter Honeyman , and Kevin Fu . 2017 . WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In Security and Privacy (EuroS&P) , 2017 IEEE European Symposium on. IEEE, 3--18 . Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE, 3--18."},{"key":"e_1_3_2_1_25_1","unstructured":"Zhengbo Wang Kang Wang Bo Yang Shangyuan Li and Aimin Pan. 2017. Sonic Gun to Smart Devices - Your Devices Lose Control Under Ultrasound\/Sound BlackHat USA.  Zhengbo Wang Kang Wang Bo Yang Shangyuan Li and Aimin Pan. 2017. Sonic Gun to Smart Devices - Your Devices Lose Control Under Ultrasound\/Sound BlackHat USA."},{"key":"e_1_3_2_1_26_1","volume-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON","author":"Yan Chen","year":"2016","unstructured":"Chen Yan , Wenyuan Xu , and Jianhao Liu . 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON Vol. 24 ( 2016 ). Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON Vol. 24 (2016)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2006.886270"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2011.5739766"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196506"}},"subtitle":["Defeating Kalman Filter in Signal Injection Attack"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":29,"alternative-id":["10.1145\/3196494.3196506","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196506","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}