{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T18:47:20Z","timestamp":1774550840242,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-17-1-2045"],"award-info":[{"award-number":["N00014-17-1-2045"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243752","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"801-816","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":158,"title":["Detecting Attacks Against Robotic Vehicles"],"prefix":"10.1145","author":[{"given":"Hongjun","family":"Choi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Wen-Chuan","family":"Lee","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Yousra","family":"Aafer","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Fan","family":"Fei","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Zhan","family":"Tu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Xinyan","family":"Deng","sequence":"additional","affiliation":[{"name":"Purdue University, Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_2_1","volume-title":"Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95","author":"Abbaspour Alireza","year":"2016"},{"key":"e_1_3_2_2_3_1","unstructured":"Amazon Prime Air Delivery 2016. Amazon Prime Air. https:\/\/www.amazon. com\/Amazon-Prime-Air\/b?node=8037720011.  Amazon Prime Air Delivery 2016. Amazon Prime Air. https:\/\/www.amazon. com\/Amazon-Prime-Air\/b?node=8037720011."},{"key":"e_1_3_2_2_4_1","unstructured":"ArduPilot 2017. ArduPilot :: Home. http:\/\/ardupilot.org\/.  ArduPilot 2017. ArduPilot :: Home. http:\/\/ardupilot.org\/."},{"key":"e_1_3_2_2_5_1","unstructured":"ArduPilot Dev Team 2016. SITL Simulator (Software in the Loop). http:\/\/ardupilot. org\/dev\/docs\/sitl-simulator-software-in-the-loop.html.  ArduPilot Dev Team 2016. SITL Simulator (Software in the Loop). http:\/\/ardupilot. org\/dev\/docs\/sitl-simulator-software-in-the-loop.html."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2011.25"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"George A Bekey. 1970. System identification-an introduction and a survey.  George A Bekey. 1970. System identification-an introduction and a survey.","DOI":"10.1177\/003754977001500403"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2004.1302409"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"e_1_3_2_2_11_1","volume-title":"USENIX Security Symposium","author":"Checkoway Stephen","year":"2011"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297069"},{"key":"e_1_3_2_2_13_1","volume-title":"Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. arXiv preprint arXiv:1801.00903","author":"Chen Yuqi","year":"2018"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.37"},{"key":"e_1_3_2_2_15_1","unstructured":"CNN 2012. Self-driving cars now legal in California. http:\/\/www.cnn.com\/2012\/ 09\/25\/tech\/innovation\/self-driving-car-california\/index.html.  CNN 2012. Self-driving cars now legal in California. http:\/\/www.cnn.com\/2012\/ 09\/25\/tech\/innovation\/self-driving-car-california\/index.html."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_2_17_1","unstructured":"comma.ai 2018. commaai\/openpilot: open source driving agent. https:\/\/github. com\/commaai\/openpilot.  comma.ai 2018. commaai\/openpilot: open source driving agent. https:\/\/github. com\/commaai\/openpilot."},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Security Symposium","volume":"98","author":"Cowan Crispan","year":"1998"},{"key":"e_1_3_2_2_19_1","unstructured":"Ang Cui Michael Costello and Salvatore J Stolfo. 2013. When Firmware Modifications Attack: A Case Study of Embedded Exploitation. (2013).  Ang Cui Michael Costello and Salvatore J Stolfo. 2013. When Firmware Modifications Attack: A Case Study of Embedded Exploitation. (2013)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_19"},{"key":"e_1_3_2_2_21_1","unstructured":"Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT.   Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT."},{"key":"e_1_3_2_2_22_1","first-page":"846","article-title":"Survey of Approaches for Security Verification of Hardware\/Software Systems","volume":"2016","author":"Demir Onur","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_23_1","unstructured":"Demo Video 2018. Attack Case 1: Sensor Spoofing Attack on IRIS+. https: \/\/bit.ly\/2Kb6TcK.  Demo Video 2018. Attack Case 1: Sensor Spoofing Attack on IRIS+. https: \/\/bit.ly\/2Kb6TcK."},{"key":"e_1_3_2_2_24_1","unstructured":"Demo Video 2018. Attack Case 2: Control Signal Attack on IRIS+. https: \/\/bit.ly\/2Ka5PpG.  Demo Video 2018. Attack Case 2: Control Signal Attack on IRIS+. https: \/\/bit.ly\/2Ka5PpG."},{"key":"e_1_3_2_2_25_1","unstructured":"Demo Video 2018. Attack Case 3: Control Parameter Corruption Attack on IRIS+. https:\/\/bit.ly\/2LQTTOo.  Demo Video 2018. Attack Case 3: Control Parameter Corruption Attack on IRIS+. https:\/\/bit.ly\/2LQTTOo."},{"key":"e_1_3_2_2_26_1","unstructured":"Demo Video 2018. Attack Case 4: Control Parameter Corruption Attack on Erle-Rover. https:\/\/bit.ly\/2LBpK6l.  Demo Video 2018. Attack Case 4: Control Parameter Corruption Attack on Erle-Rover. https:\/\/bit.ly\/2LBpK6l."},{"key":"e_1_3_2_2_27_1","unstructured":"Demo Video 2018. Attack Case 5: Motor Input Spoofing Attack on Erle-Rover. https:\/\/bit.ly\/2LFPKOk.  Demo Video 2018. Attack Case 5: Motor Input Spoofing Attack on Erle-Rover. https:\/\/bit.ly\/2LFPKOk."},{"key":"e_1_3_2_2_28_1","unstructured":"Demo Video 2018. Attack Case 6: Sensor Manipulation Attack on Erle-Rover. https:\/\/bit.ly\/2NXJDRQ.  Demo Video 2018. Attack Case 6: Sensor Manipulation Attack on Erle-Rover. https:\/\/bit.ly\/2NXJDRQ."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8462886"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(90)90018-D"},{"key":"e_1_3_2_2_32_1","first-page":"37","article-title":"On cyber attacks and signature based intrusion detection for modbus based industrial control systems","volume":"9","author":"Gao Wei","year":"2014","journal-title":"The Journal of Digital Forensics, Security and Law: JDFSL"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(92)90117-X"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2016.63"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the ION GNSS international technical meeting of the satellite division","volume":"55","author":"Humphreys Todd E","year":"2008"},{"key":"e_1_3_2_2_36_1","volume-title":"Detours: Binary Interception of Win32 Functions. In 3rd usenix windows nt symposium.","author":"Hunt Galen","year":"1999"},{"key":"e_1_3_2_2_37_1","volume-title":"Cyber-attack detection based on controlled invariant sets","author":"IEEE"},{"key":"e_1_3_2_2_38_1","volume-title":"19th USENIX Security Symposium, Washington DC. 11--13","author":"Ishtiaq Roufa Rob Millerb","year":"2010"},{"key":"e_1_3_2_2_39_1","unstructured":"JSBSim 2009. JSBSim Open Source Flight Dynamics Model. http:\/\/jsbsim. sourceforge.net\/.  JSBSim 2009. JSBSim Open Source Flight Dynamics Model. http:\/\/jsbsim. sourceforge.net\/."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.51"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23107"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00011"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_2_48_1","volume-title":"Issues in system identification","author":"Ljung Lennart","year":"1991"},{"key":"e_1_3_2_2_49_1","unstructured":"MATLAB 2017. System Identification Toolbox - MATLAB. https:\/\/www. mathworks.com\/products\/sysid.html.  MATLAB 2017. System Identification Toolbox - MATLAB. https:\/\/www. mathworks.com\/products\/sysid.html."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1982.1102926"},{"key":"e_1_3_2_2_51_1","unstructured":"Military.com 2018. Drones | Military.com. http:\/\/www.military.com\/equipment\/ drones.  Military.com 2018. Drones | Military.com. http:\/\/www.military.com\/equipment\/ drones."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"e_1_3_2_2_54_1","volume-title":"False data injection attacks in control systems. (01","author":"Mo Yilin","year":"2010"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_2_56_1","volume-title":"Modern control engineering","author":"Ogata Katsuhiko"},{"key":"e_1_3_2_2_57_1","unstructured":"Open Source Robotics Foundation 2014. Gazebo. http:\/\/gazebosim.org\/.  Open Source Robotics Foundation 2014. Gazebo. http:\/\/gazebosim.org\/."},{"key":"e_1_3_2_2_58_1","unstructured":"Young-Seok Park Yunmok Son Hocheol Shin Dohyun Kim and Yongdae Kim. 2016. This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.. In WOOT.   Young-Seok Park Yunmok Son Hocheol Shin Dohyun Kim and Yongdae Kim. 2016. This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.. In WOOT."},{"key":"e_1_3_2_2_59_1","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit Jonathan","year":"2015","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46982-9_19"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","volume-title":"Signal analysis and prediction","author":"Prochazka Ales","DOI":"10.1007\/978-1-4612-1768-8"},{"key":"e_1_3_2_2_62_1","unstructured":"PX4 Dev Team 2017. Open Source for Drones - PX4 Pro Open Source Autopilot. http:\/\/px4.io\/.  PX4 Dev Team 2017. Open Source for Drones - PX4 Pro Open Source Autopilot. http:\/\/px4.io\/."},{"key":"e_1_3_2_2_63_1","volume-title":"Fundamentals of speech recognition","author":"Rabiner Lawrence R"},{"key":"e_1_3_2_2_64_1","unstructured":"ROS 2017. ROS.org | Powering the world's robots. http:\/\/www.ros.org\/.  ROS 2017. ROS.org | Powering the world's robots. http:\/\/www.ros.org\/."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04694-0_10"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2303131"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225028"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654813"},{"key":"e_1_3_2_2_72_1","volume-title":"USENIX Security Symposium. 881--896","author":"Son Yunmok","year":"2015"},{"key":"e_1_3_2_2_73_1","unstructured":"Storm Prediction Center NOAA \/ NationalWeather Service 2017. Beaufort Wind Scale. http:\/\/www.spc.noaa.gov\/faq\/tornado\/beaufort.html.  Storm Prediction Center NOAA \/ NationalWeather Service 2017. Beaufort Wind Scale. http:\/\/www.spc.noaa.gov\/faq\/tornado\/beaufort.html."},{"key":"e_1_3_2_2_74_1","unstructured":"The Guardian 2016. First passenger drone makes its debut at CES. https:\/\/www.theguardian.com\/technology\/2016\/jan\/07\/ first-passenger-drone-makes-world-debut.  The Guardian 2016. First passenger drone makes its debut at CES. https:\/\/www.theguardian.com\/technology\/2016\/jan\/07\/ first-passenger-drone-makes-world-debut."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_2_76_1","volume-title":"2017 IEEE European Symposium on. IEEE, 3--18","author":"Trippel Timothy","year":"2017"},{"key":"e_1_3_2_2_77_1","unstructured":"ZhengboWang KangWang Bo Yang Shangyuan Li and Aimin Pan. 2017. SONIC GUN TO SMART DEVICES. Black Hat USA.  ZhengboWang KangWang Bo Yang Shangyuan Li and Aimin Pan. 2017. SONIC GUN TO SMART DEVICES. Black Hat USA."},{"key":"e_1_3_2_2_78_1","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner Jon S","year":"2002","journal-title":"Journal of Security Administration"},{"key":"e_1_3_2_2_79_1","unstructured":"Waymo 2017. Waymo (formerly the Google self-driving car project). https: \/\/waymo.com.  Waymo 2017. Waymo (formerly the Google self-driving car project). https: \/\/waymo.com."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1987.289361"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055010"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.008"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795210"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243752","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243752"}},"subtitle":["A Control Invariant Approach"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":84,"alternative-id":["10.1145\/3243734.3243752","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243752","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}