{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T22:18:08Z","timestamp":1767046688150,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1513797"],"award-info":[{"award-number":["1513797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NASA","award":["NNX16AB09G"],"award-info":[{"award-number":["NNX16AB09G"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3264888.3264889","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"48-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control"],"prefix":"10.1145","author":[{"given":"Jed","family":"Liu","sequence":"first","affiliation":[{"name":"Barefoot Networks, Ithaca, NY, USA"}]},{"given":"Joe","family":"Corbett-Davies","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Andrew","family":"Ferraiuolo","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Alexander","family":"Ivanov","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Mulong","family":"Luo","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Mark","family":"Campbell","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733561"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22102-1_3"},{"key":"e_1_3_2_1_4_1","volume-title":"Fired: Frequent inertial resets with diversification for emerging commodity cyber-physical systems. arXiv preprint arXiv:1702.06595","author":"Arroyo M.","year":"2017","unstructured":"M. Arroyo , H. Kobayashi , S. Sethumadhavan , and J. Yang . Fired: Frequent inertial resets with diversification for emerging commodity cyber-physical systems. arXiv preprint arXiv:1702.06595 , 2017 . M. Arroyo, H. Kobayashi, S. Sethumadhavan, and J. Yang. Fired: Frequent inertial resets with diversification for emerging commodity cyber-physical systems. arXiv preprint arXiv:1702.06595, 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"High Integrity Software: The SPARK Approach to Safety and Security","author":"Barnes J.","year":"2003","unstructured":"J. Barnes . High Integrity Software: The SPARK Approach to Safety and Security . Addison Wesley , Apr. 2003 . ISBN 0321136160. J. Barnes. High Integrity Software: The SPARK Approach to Safety and Security. Addison Wesley, Apr. 2003. ISBN 0321136160."},{"key":"e_1_3_2_1_7_1","volume-title":"Whoever Owns the Maps Owns the Future of Self-Driving Cars","author":"Berman B.","year":"2016","unstructured":"B. Berman . Whoever Owns the Maps Owns the Future of Self-Driving Cars , 2016 . B. Berman. Whoever Owns the Maps Owns the Future of Self-Driving Cars, 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_9_1","volume-title":"Intelligent Vehicle Technology and Trends","author":"Bishop R.","year":"2005","unstructured":"R. Bishop . Intelligent Vehicle Technology and Trends . 2005 . R. Bishop. Intelligent Vehicle Technology and Trends. 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192406"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium","author":"Checkoway S.","year":"2011","unstructured":"S. Checkoway , D. McCoy , B. Kantor , D. Anderson , H. Shacham , S. Savage , K. Koscher , A. Czeskis , F. Roesner , T. Kohno , Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security Symposium . San Francisco , 2011 . S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno, et al. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. San Francisco, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.188"},{"key":"e_1_3_2_1_13_1","volume-title":"Technical report","author":"Coulter R. C.","year":"1992","unstructured":"R. C. Coulter . Implementation of the pure pursuit path tracking algorithm. Technical report , Carnegie-Mellon University , 1992 . R. C. Coulter. Implementation of the pure pursuit path tracking algorithm. Technical report, Carnegie-Mellon University, 1992."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2007.79"},{"key":"e_1_3_2_1_15_1","unstructured":"R. Descartes. Meditations on First Philosophy. 1641.  R. Descartes. Meditations on First Philosophy. 1641."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037739"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.28"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032335"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.01.005"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Journal of Cryptographic Engineering","author":"Ge Q.","year":"2016","unstructured":"Q. Ge , Y. Yarom , D. Cock , and G. Heiser . A survey of microarchitectural timing attacks and countermeasures on contemporary hardware . Journal of Cryptographic Engineering , pages 1 -- 27 , 2016 . Q. Ge, Y. Yarom, D. Cock, and G. Heiser. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering, pages 1--27, 2016."},{"key":"e_1_3_2_1_22_1","volume-title":"A formal basis for the heuristic determination of minimum cost paths","author":"Hart P. E.","year":"1968","unstructured":"P. E. Hart , N. J. Nilsson , and B. Raphael . A formal basis for the heuristic determination of minimum cost paths . IEEE transactions on Systems Science and Cybernetics , 4(2):100--107, 1968 . P. E. Hart, N. J. Nilsson, and B. Raphael. A formal basis for the heuristic determination of minimum cost paths. IEEE transactions on Systems Science and Cybernetics, 4(2):100--107, 1968."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694366"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Proc. BlackHat Europe","author":"Jeske T.","year":"2013","unstructured":"T. Jeske . Floating car data from smartphones: What Google and Waze know about you and how hackers can control traffic . In Proc. BlackHat Europe , pages 1 -- 12 , 2013 . T. Jeske. Floating car data from smartphones: What Google and Waze know about you and how hackers can control traffic. In Proc. BlackHat Europe, pages 1--12, 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_27_1","volume-title":"Jan.","author":"Kocher P.","year":"2018","unstructured":"P. Kocher , D. Genkin , D. Gruss , W. Haas , M. Hamburg , M. Lipp , S. Mangard , T. Prescher , M. Schwarz , and Y. Yarom . Spectre attacks: Exploiting speculative execution. ArXiv e-prints , Jan. 2018 . P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. Spectre attacks: Exploiting speculative execution. ArXiv e-prints, Jan. 2018."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541947"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_1_30_1","volume-title":"Jan.","author":"Lipp M.","year":"2018","unstructured":"M. Lipp , M. Schwarz , D. Gruss , T. Prescher , W. Haas , S. Mangard , P. Kocher , D. Genkin , Y. Yarom , and M. Hamburg . Meltdown . ArXiv e-prints , Jan. 2018 . M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg. Meltdown. ArXiv e-prints, Jan. 2018."},{"key":"e_1_3_2_1_31_1","unstructured":"J. Liu J. Corbett-Davies A. Ferraiuolo M. Campbell G. E. Suh and A. C. Myers. Videos of demo of self-driving robot with map verification. Online http:\/\/hdl.handle.net\/1813\/52638 Oct. 2017.  J. Liu J. Corbett-Davies A. Ferraiuolo M. Campbell G. E. Suh and A. C. Myers. Videos of demo of self-driving robot with map verification. Online http:\/\/hdl.handle.net\/1813\/52638 Oct. 2017."},{"key":"e_1_3_2_1_32_1","volume-title":"Iran Claims Successful Test Flight of Stealth UAV","author":"Majumdar D.","year":"2014","unstructured":"D. Majumdar . Iran Claims Successful Test Flight of Stealth UAV , 2014 . D. Majumdar. Iran Claims Successful Test Flight of Stealth UAV, 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.236"},{"key":"e_1_3_2_1_34_1","volume-title":"Stuxnet worm hit industrial systems","author":"McMillan R.","year":"2010","unstructured":"R. McMillan . Siemens : Stuxnet worm hit industrial systems , 2010 . R. McMillan. Siemens: Stuxnet worm hit industrial systems, 2010."},{"key":"e_1_3_2_1_35_1","volume-title":"Remote exploitation of an unaltered passenger vehicle","author":"Miller C.","year":"2015","unstructured":"C. Miller and C. Valasek . Remote exploitation of an unaltered passenger vehicle . 2015 . C. Miller and C. Valasek. Remote exploitation of an unaltered passenger vehicle. 2015."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139337.3139347"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"Moscibroda T.","year":"2007","unstructured":"T. Moscibroda and O. Mutlu . Memory performance attacks: Denial of memory service in multi-core systems . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , 2007 . T. Moscibroda and O. Mutlu. Memory performance attacks: Denial of memory service in multi-core systems. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenCV. textttwww.opencv.org.  OpenCV. textttwww.opencv.org."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"e_1_3_2_1_42_1","volume-title":"Black Hat Europe","author":"Petit J.","year":"2015","unstructured":"J. Petit , B. Stottelar , M. Feiri , and F. Kargi . Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR . In Black Hat Europe , 2015 . J. Petit, B. Stottelar, M. Feiri, and F. Kargi. Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR. In Black Hat Europe, 2015."},{"key":"e_1_3_2_1_43_1","unstructured":"PointGrey. textttwww.ptgrey.com.  PointGrey. textttwww.ptgrey.com."},{"key":"e_1_3_2_1_44_1","volume-title":"Ubiquitous computing: smart devices, environments and interactions","author":"Poslad S.","year":"2011","unstructured":"S. Poslad . Ubiquitous computing: smart devices, environments and interactions . John Wiley & Sons , 2011 . S. Poslad. Ubiquitous computing: smart devices, environments and interactions. John Wiley & Sons, 2011."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968478.2968495"},{"key":"e_1_3_2_1_46_1","unstructured":"Robot Operating System. textttwww.ros.org.  Robot Operating System. textttwww.ros.org."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2011.4"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"e_1_3_2_1_50_1","unstructured":"SICK Inc. textttwww.sick.com.  SICK Inc. textttwww.sick.com."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2460333"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_2"},{"key":"e_1_3_2_1_53_1","volume-title":"Apr.","author":"Development Team The Coq","year":"2018","unstructured":"The Coq Development Team . The Coq proof assistant, version 8.8.0 , Apr. 2018 . The Coq Development Team. The Coq proof assistant, version 8.8.0, Apr. 2018."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/504729.504754"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497798"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"e_1_3_2_1_57_1","unstructured":"Vicon Motion Systems Ltd. textttwww.vicon.com.  Vicon Motion Systems Ltd. textttwww.vicon.com."},{"key":"e_1_3_2_1_58_1","volume-title":"Attacking SMM Memory via Intel CPU Cache Poisoning. invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf","author":"Wojtczuk R.","year":"2009","unstructured":"R. Wojtczuk and J. Rutkowska . Attacking SMM Memory via Intel CPU Cache Poisoning. invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf , 2009 . R. Wojtczuk and J. Rutkowska. Attacking SMM Memory via Intel CPU Cache Poisoning. invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf, 2009."},{"key":"e_1_3_2_1_59_1","unstructured":"R. Wojtczuk and J. Rutkowska. Following the White Rabbit: Software Attacks Against Intel VT-d Technology. http:\/\/theinvisiblethings.blogspot.com\/2011\/05\/following-white-rabbit-software-attacks.html 2011.  R. Wojtczuk and J. Rutkowska. Following the White Rabbit: Software Attacks Against Intel VT-d Technology. http:\/\/theinvisiblethings.blogspot.com\/2011\/05\/following-white-rabbit-software-attacks.html 2011."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.004"},{"key":"e_1_3_2_1_61_1","volume-title":"Estimation with Applications to Tracking and Navigation","author":"Yaakov Bar-Shalom T. K.","year":"2001","unstructured":"T. K. Yaakov Bar-Shalom , Xiao-Rong Li . Estimation with Applications to Tracking and Navigation . Wiley , New York , 1 st edition, 2001 . T. K. Yaakov Bar-Shalom, Xiao-Rong Li. Estimation with Applications to Tracking and Navigation. Wiley, New York, 1st edition, 2001.","edition":"1"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_1_63_1","unstructured":"ZedBoard. textttwww.zedboard.org.  ZedBoard. textttwww.zedboard.org."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"e_1_3_2_1_65_1","volume-title":"April","author":"Zetter K.","year":"2015","unstructured":"K. Zetter . Headline: Hackers could commandeer new planes through passenger wi-fi , April 2015 . K. Zetter. Headline: Hackers could commandeer new planes through passenger wi-fi, April 2015."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747947"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264888.3264889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264888.3264889","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264888.3264889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:58Z","timestamp":1750212478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264888.3264889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":67,"alternative-id":["10.1145\/3264888.3264889","10.1145\/3264888"],"URL":"https:\/\/doi.org\/10.1145\/3264888.3264889","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}