{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:51Z","timestamp":1773511131377,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Intel"},{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359847","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"660-672","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Out of control"],"prefix":"10.1145","author":[{"given":"Pritam","family":"Dash","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Mehdi","family":"Karimibiuki","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Karthik","family":"Pattabiraman","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106282"},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"Amazon Prime","year":"2019","unstructured":"Amazon Prime [n. d.]. Amazon Prime Delivery . Retrieved January 24, 2019 from https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011 Amazon Prime [n. d.]. Amazon Prime Delivery. Retrieved January 24, 2019 from https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"ArduPilot","year":"2018","unstructured":"ArduPilot [n. d.]. Ardupilot - Software in the Loop . Retrieved May 24, 2018 from http:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html ArduPilot [n. d.]. Ardupilot - Software in the Loop. Retrieved May 24, 2018 from http:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Baker Aryn","year":"2019","unstructured":"Aryn Baker . [n. d.]. Zipline Drone Delivery . Retrieved January 24, 2019 from http:\/\/www.flyzipline.com\/ Aryn Baker. [n. d.]. Zipline Drone Delivery. Retrieved January 24, 2019 from http:\/\/www.flyzipline.com\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2010.02.014"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Burns Stephen","year":"2019","unstructured":"Stephen Burns . [n. d.]. Drone meets delivery truck . Retrieved May 24, 2019 from https:\/\/www.ups.com\/us\/es\/services\/knowledge-center\/article.page?name=drone-meets-delivery-truck&kid=cd18bdc2 Stephen Burns. [n. d.]. Drone meets delivery truck. Retrieved May 24, 2019 from https:\/\/www.ups.com\/us\/es\/services\/knowledge-center\/article.page?name=drone-meets-delivery-truck&kid=cd18bdc2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.126"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3311041"},{"key":"e_1_3_2_1_15_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Chung Keywhan","year":"2019","unstructured":"Keywhan Chung , Xiao Li , Peicheng Tang , Zeran Zhu , Zbigniew T. Kalbarczyk , Ravishankar K. Iyer , and Thenkurussi Kesavadas . 2019 . Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). USENIX Association, Chaoyang District, Beijing, 337--351. https:\/\/www.usenix.org\/conference\/raid 2019\/presentation\/chung Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, and Thenkurussi Kesavadas. 2019. Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 337--351. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/chung"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"e_1_3_2_1_17_1","volume-title":"Controlling UAVs with Sensor Input Spoofing Attacks. In 10th USENIX Workshop on Offensive Technologies (WOOT 16)","author":"Davidson Drew","year":"2016","unstructured":"Drew Davidson , Hao Wu , Rob Jellinek , Vikas Singh , and Thomas Ristenpart . 2016 . Controlling UAVs with Sensor Input Spoofing Attacks. In 10th USENIX Workshop on Offensive Technologies (WOOT 16) . USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/davidson Drew Davidson, Hao Wu, Rob Jellinek, Vikas Singh, and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks. In 10th USENIX Workshop on Offensive Technologies (WOOT 16). USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/davidson"},{"key":"e_1_3_2_1_18_1","unstructured":"ETH-Agile and Dexterous Robotics Lab. [n. d.]. Control Toolbox. https:\/\/ethz-adrl.github.io\/ct\/ct_doc\/doc\/html\/index.html  ETH-Agile and Dexterous Robotics Lab. [n. d.]. Control Toolbox. https:\/\/ethz-adrl.github.io\/ct\/ct_doc\/doc\/html\/index.html"},{"key":"e_1_3_2_1_19_1","volume-title":"Feedback Control of Dynamic Systems","author":"Franklin Gene F.","year":"2025","unstructured":"Gene F. Franklin , J. David Powell , and Abbas Emami-Naeini . 2018. Feedback Control of Dynamic Systems ( 8 th Edition) (What's New in Engineering). Pearson . https:\/\/www.amazon.com\/Feedback-Control-Dynamic-Systems-Engineering\/dp\/0134685717?SubscriptionId=AKIAIOBINVZYXZQZ2U3A&tag=chimbori05-20&linkCode=xm2&camp= 2025 &creative=165953&creativeASIN=0134685717 Gene F. Franklin, J. David Powell, and Abbas Emami-Naeini. 2018. Feedback Control of Dynamic Systems (8th Edition) (What's New in Engineering). Pearson. https:\/\/www.amazon.com\/Feedback-Control-Dynamic-Systems-Engineering\/dp\/0134685717?SubscriptionId=AKIAIOBINVZYXZQZ2U3A&tag=chimbori05-20&linkCode=xm2&camp=2025&creative=165953&creativeASIN=0134685717","edition":"8"},{"key":"e_1_3_2_1_20_1","volume-title":"Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz.","author":"Garcia Luis","year":"2017","unstructured":"Luis Garcia , Ferdinand Brasser , Mehmet Hazar Cintuglu , Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz. 2017 . Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In NDSS. Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In NDSS."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8264281"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_23_1","unstructured":"Jason Baker (Red Hat). [n. d.]. Open source drone projects. https:\/\/opensource.com\/article\/18\/2\/drone-projects  Jason Baker (Red Hat). [n. d.]. Open source drone projects. https:\/\/opensource.com\/article\/18\/2\/drone-projects"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Hawkins Andrew J.","year":"2019","unstructured":"Andrew J. Hawkins . [n. d.]. UPS will use drones to deliver medical supplies in North Carolina . Retrieved May 24, 2019 from https:\/\/www.theverge.com\/2019\/3\/26\/18282291\/ups-drone-delivery-hospital-nc-matternet Andrew J. Hawkins. [n. d.]. UPS will use drones to deliver medical supplies in North Carolina. Retrieved May 24, 2019 from https:\/\/www.theverge.com\/2019\/3\/26\/18282291\/ups-drone-delivery-hospital-nc-matternet"},{"key":"e_1_3_2_1_25_1","volume-title":"In Proceedings of the Institute of Navigation GNSS (ION GNSS.","author":"Humphreys Todd E.","year":"2008","unstructured":"Todd E. Humphreys . 2008 . Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer . In In Proceedings of the Institute of Navigation GNSS (ION GNSS. Todd E. Humphreys. 2008. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In In Proceedings of the Institute of Navigation GNSS (ION GNSS."},{"key":"e_1_3_2_1_26_1","volume-title":"Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, and Ravishankar K. Iyer.","author":"Jha Saurabh","year":"2019","unstructured":"Saurabh Jha , Subho S. Banerjee , Timothy Tsai , Siva Kumar Sastry Hari , Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, and Ravishankar K. Iyer. 2019 . ML-based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection. CoRR abs\/1907.01051 (2019). arXiv:1907.01051 http:\/\/arxiv.org\/abs\/1907.01051 Saurabh Jha, Subho S. Banerjee, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, and Ravishankar K. Iyer. 2019. ML-based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection. CoRR abs\/1907.01051 (2019). arXiv:1907.01051 http:\/\/arxiv.org\/abs\/1907.01051"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Sim","year":"2018","unstructured":"JSM Sim [n. d.]. JSBSim Open Source Flight Dynamics Model . Retrieved May 24, 2018 from \"http:\/\/jsbsim.sourceforge.net\/\" JSMSim [n. d.]. JSBSim Open Source Flight Dynamics Model. Retrieved May 24, 2018 from \"http:\/\/jsbsim.sourceforge.net\/\""},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"e_1_3_2_1_29_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Kim Taegyu","year":"2019","unstructured":"Taegyu Kim , Chung Hwan Kim , Junghwan Rhee , Fan Fei , Zhan Tu , Gregory Walkup , Xiangyu Zhang , Xinyan Deng , and Dongyan Xu . 2019 . RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 425--442. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/kim Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu. 2019. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 425--442. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/kim"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2011.5985724"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"e_1_3_2_1_34_1","unstructured":"MATLAB. [n. d.]. System Identification Overview. ([n. d.]). https:\/\/www.mathworks.com\/help\/ident\/gs\/about-system-identification.html  MATLAB. [n. d.]. System Identification Overview. ([n. d.]). https:\/\/www.mathworks.com\/help\/ident\/gs\/about-system-identification.html"},{"key":"e_1_3_2_1_35_1","unstructured":"MATLAB. [n. d.]. System Identification Toolbox. ([n. d.]). https:\/\/www.mathworks.com\/products\/sysid.html  MATLAB. [n. d.]. System Identification Toolbox. ([n. d.]). https:\/\/www.mathworks.com\/products\/sysid.html"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007754"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5980229"},{"key":"e_1_3_2_1_38_1","unstructured":"MARS 2020 Mission. [n. d.]. MARS Exploration Rover. https:\/\/mars.nasa.gov\/mer\/mission\/rover\/  MARS 2020 Mission. [n. d.]. MARS Exploration Rover. https:\/\/mars.nasa.gov\/mer\/mission\/rover\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248326.2248334"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_1_41_1","unstructured":"GNU Octave. [n. d.]. GNU Octave Scientific Programming Language. https:\/\/www.gnu.org\/software\/octave\/  GNU Octave. [n. d.]. GNU Octave Scientific Programming Language. https:\/\/www.gnu.org\/software\/octave\/"},{"key":"e_1_3_2_1_42_1","unstructured":"Out of Control. [n. d.]. Artificial Delay Attack Demo Video. https:\/\/drive.google.com\/open?id=1_CHITopKSraKZXnAIyeUoQZqki8fgUXe  Out of Control. [n. d.]. Artificial Delay Attack Demo Video. https:\/\/drive.google.com\/open?id=1_CHITopKSraKZXnAIyeUoQZqki8fgUXe"},{"key":"e_1_3_2_1_43_1","unstructured":"Out of Control. [n. d.]. False Data Injection Attack Demo Video. https:\/\/drive.google.com\/open?id=1JgrCpwspsBiYdNvKUxeKnl-bZQ9WS_Cg  Out of Control. [n. d.]. False Data Injection Attack Demo Video. https:\/\/drive.google.com\/open?id=1JgrCpwspsBiYdNvKUxeKnl-bZQ9WS_Cg"},{"key":"e_1_3_2_1_44_1","unstructured":"Out of Control. [n. d.]. Switch Mode Attack Demo Video. https:\/\/drive.google.com\/open?id=1yUSGa5GoBQYl0GTiTbcPFN5NnjBHXL-Y  Out of Control. [n. d.]. Switch Mode Attack Demo Video. https:\/\/drive.google.com\/open?id=1yUSGa5GoBQYl0GTiTbcPFN5NnjBHXL-Y"},{"key":"e_1_3_2_1_45_1","volume-title":"Path-Following through Control Funnel Functions. CoRR abs\/1804.05288","author":"Ravanbakhsh Hadi","year":"2018","unstructured":"Hadi Ravanbakhsh , Sina Aghli , Christoffer Heckman , and Sriram Sankaranarayanan . 2018. Path-Following through Control Funnel Functions. CoRR abs\/1804.05288 ( 2018 ). arXiv:1804.05288 http:\/\/arxiv.org\/abs\/1804.05288 Hadi Ravanbakhsh, Sina Aghli, Christoffer Heckman, and Sriram Sankaranarayanan. 2018. Path-Following through Control Funnel Functions. CoRR abs\/1804.05288 (2018). arXiv:1804.05288 http:\/\/arxiv.org\/abs\/1804.05288"},{"key":"e_1_3_2_1_46_1","volume-title":"d.]. An Analysis of Global Positioning System (GPS) Standard Positioning Service (SPS) Performance for","author":"Renfro Brent A.","year":"2018","unstructured":"Brent A. Renfro , Miquela Stein , Nicholas Boeker , Emery Reed , and Eduardo Villalba . [n. d.]. An Analysis of Global Positioning System (GPS) Standard Positioning Service (SPS) Performance for 2018 . Brent A. Renfro, Miquela Stein, Nicholas Boeker, Emery Reed, and Eduardo Villalba. [n. d.]. An Analysis of Global Positioning System (GPS) Standard Positioning Service (SPS) Performance for 2018."},{"key":"e_1_3_2_1_47_1","unstructured":"Aion Robotics. [n. d.]. R1 ArduPilot Edition. https:\/\/docs.aionrobotics.com\/en\/latest\/r1-ugv.html  Aion Robotics. [n. d.]. R1 ArduPilot Edition. https:\/\/docs.aionrobotics.com\/en\/latest\/r1-ugv.html"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_3_2_1_49_1","first-page":"2018","volume-title":"Retrieved","author":"Sheilds Nicolas","year":"2018","unstructured":"Nicolas Sheilds . [n. d.]. Walmart Drone Delivery . Retrieved December 09, 2018 from https:\/\/www.businessinsider.com\/walmart-blockchain-drone-delivery-patent- 2018 - 2019 Nicolas Sheilds. [n. d.]. Walmart Drone Delivery. Retrieved December 09, 2018 from https:\/\/www.businessinsider.com\/walmart-blockchain-drone-delivery-patent-2018-9"},{"key":"e_1_3_2_1_50_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Shoukry Yasser","year":"2013","unstructured":"Yasser Shoukry , Paul Martin , Paulo Tabuada , and Mani Srivastava . 2013. Non-invasive Spoofing Attacks for Anti-lock Braking Systems . In Cryptographic Hardware and Embedded Systems - CHES 2013 , Guido Bertoni and Jean-Sebastien Coron (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 55--72. Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2013. Non-invasive Spoofing Attacks for Anti-lock Braking Systems. In Cryptographic Hardware and Embedded Systems - CHES 2013, Guido Bertoni and Jean-Sebastien Coron (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 55--72."},{"key":"e_1_3_2_1_51_1","volume-title":"Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Youngseok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , and Yongdae Kim . 2015 . Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 881--896. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/son Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 881--896. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/son"},{"key":"e_1_3_2_1_52_1","unstructured":"Christopher Steiner. [n. d.]. Bot-In-Time Delivery. https:\/\/www.forbes.com\/forbes\/2009\/0316\/040_bot_time_saves_nine.html#68ee53d9b942  Christopher Steiner. [n. d.]. Bot-In-Time Delivery. https:\/\/www.forbes.com\/forbes\/2009\/0316\/040_bot_time_saves_nine.html#68ee53d9b942"},{"key":"e_1_3_2_1_53_1","unstructured":"ArduPilot Development Team. [n. d.]. Building ArduPilot. https:\/\/github.com\/ArduPilot\/ardupilot\/blob\/master\/BUILD.md  ArduPilot Development Team. [n. d.]. Building ArduPilot. https:\/\/github.com\/ArduPilot\/ardupilot\/blob\/master\/BUILD.md"},{"key":"e_1_3_2_1_54_1","unstructured":"Paparazzi Development Team. [n. d.]. Paparazzi - The Free Autopilot. https:\/\/wiki.paparazziuav.org\/wiki\/Main_Page  Paparazzi Development Team. [n. d.]. Paparazzi - The Free Autopilot. https:\/\/wiki.paparazziuav.org\/wiki\/Main_Page"},{"key":"e_1_3_2_1_55_1","unstructured":"Pixhawk Development Team. [n. d.]. Pixhawk AutoPilot. https:\/\/docs.px4.io\/en\/flight_controller\/pixhawk_series.html  Pixhawk Development Team. [n. d.]. Pixhawk AutoPilot. https:\/\/docs.px4.io\/en\/flight_controller\/pixhawk_series.html"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7793820"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359847"}},"subtitle":["stealthy attacks against robotic vehicles protected by control-based techniques"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":57,"alternative-id":["10.1145\/3359789.3359847","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359847","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}