{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T11:00:53Z","timestamp":1774782053430,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Energy","award":["DE-OE0000780"],"award-info":[{"award-number":["DE-OE0000780"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471869","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"428-441","source":"Crossref","is-referenced-by-count":24,"title":["Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing"],"prefix":"10.1145","author":[{"given":"Aolin","family":"Ding","sequence":"first","affiliation":[{"name":"Rutgers University, US"}]},{"given":"Praveen","family":"Murthy","sequence":"additional","affiliation":[{"name":"Swirlds Inc., US"}]},{"given":"Luis","family":"Garcia","sequence":"additional","affiliation":[{"name":"University of Southern California, Information Sciences Institute, US"}]},{"given":"Pengfei","family":"Sun","sequence":"additional","affiliation":[{"name":"F5 Networks, US"}]},{"given":"Matthew","family":"Chan","sequence":"additional","affiliation":[{"name":"Rutgers University, US"}]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[{"name":"Rutgers University, US"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Gazebo: Open Source Robotics Foundation. http:\/\/gazebosim.org\/.  2014. Gazebo: Open Source Robotics Foundation. http:\/\/gazebosim.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. 3rd Eye Scene. https:\/\/github.com\/csiro-robotics\/3rdEyeScene.  2020. 3rd Eye Scene. https:\/\/github.com\/csiro-robotics\/3rdEyeScene."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Optuna: A hyperparameter optimization framework. https:\/\/github.com\/optuna\/optuna.  2020. Optuna: A hyperparameter optimization framework. https:\/\/github.com\/optuna\/optuna."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. RetDec: a retargetable machine-code decompiler based on LLVM. https:\/\/retdec.com\/.  2020. RetDec: a retargetable machine-code decompiler based on LLVM. https:\/\/retdec.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. SITL Simulator (Software in the Loop). https:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html.  2020. SITL Simulator (Software in the Loop). https:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. Black Magic Probe. https:\/\/github.com\/blacksphere\/blackmagic\/wiki.  2021. Black Magic Probe. https:\/\/github.com\/blacksphere\/blackmagic\/wiki."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. LLVM Alias Analysis Infrastructure. https:\/\/llvm.org\/docs\/AliasAnalysis.html.  2021. LLVM Alias Analysis Infrastructure. https:\/\/llvm.org\/docs\/AliasAnalysis.html."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. LLVM Pass Framework. https:\/\/llvm.org\/docs\/WritingAnLLVMPass.html.  2021. LLVM Pass Framework. https:\/\/llvm.org\/docs\/WritingAnLLVMPass.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. PX4 Pro Open Source Autopilot - Open Source for Drones. http:\/\/px4.io.  2021. PX4 Pro Open Source Autopilot - Open Source for Drones. http:\/\/px4.io."},{"key":"e_1_3_2_1_10_1","unstructured":"Retrieved July 1 2020. DHL parcelcopter launches initial operations for research purposes. https:\/\/www.dhl.com\/en\/press\/releases\/releases_2014\/group\/dhl_parcelcopter_launches_initial_operations_for_research_purposes.html.  Retrieved July 1 2020. DHL parcelcopter launches initial operations for research purposes. https:\/\/www.dhl.com\/en\/press\/releases\/releases_2014\/group\/dhl_parcelcopter_launches_initial_operations_for_research_purposes.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Retrieved July 2020. ArduPilot: versatile Trusted Open Autopilot software for drones and other autonomous systems. https:\/\/ardupilot.org\/about.  Retrieved July 2020. ArduPilot: versatile Trusted Open Autopilot software for drones and other autonomous systems. https:\/\/ardupilot.org\/about."},{"key":"e_1_3_2_1_12_1","unstructured":"Retrieved September 1 2020. The Crazyflie 2.0 a lightweight open source flying development platform. https:\/\/www.bitcraze.io\/products\/old-products\/crazyflie-2-0\/.  Retrieved September 1 2020. The Crazyflie 2.0 a lightweight open source flying development platform. https:\/\/www.bitcraze.io\/products\/old-products\/crazyflie-2-0\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Retrieved September 1 2020. Valgrind: the instrumentation framework for building dynamic analysis tools. https:\/\/valgrind.org\/.  Retrieved September 1 2020. Valgrind: the instrumentation framework for building dynamic analysis tools. https:\/\/valgrind.org\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95","author":"Abbaspour Alireza","year":"2016","unstructured":"Alireza Abbaspour , Kang\u00a0 K Yen , Shirin Noei , and Arman Sargolzaei . 2016. Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95 ( 2016 ), 193\u2013200. Alireza Abbaspour, Kang\u00a0K Yen, Shirin Noei, and Arman Sargolzaei. 2016. Detection of fault data injection attack on uav using adaptive neural network. Procedia computer science 95 (2016), 193\u2013200."},{"key":"e_1_3_2_1_15_1","volume-title":"DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS.","author":"Abera Tigist","year":"2019","unstructured":"Tigist Abera , Raad Bahmani , Ferdinand Brasser , Ahmad Ibrahim , Ahmad-Reza Sadeghi , and Matthias Schunter . 2019 . DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS. Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00011"},{"key":"e_1_3_2_1_17_1","volume-title":"27th Annual Network and Distributed System Security Symposium, NDSS","author":"Almakhdhub Naif\u00a0Saleh","year":"2020","unstructured":"Naif\u00a0Saleh Almakhdhub , Abraham\u00a0 A Clements , Saurabh Bagchi , and Mathias Payer . 2020 . \u03bcRAI: Securing embedded systems with return address integrity . In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA , February 23-26. Naif\u00a0Saleh Almakhdhub, Abraham\u00a0A Clements, Saurabh Bagchi, and Mathias Payer. 2020. \u03bcRAI: Securing embedded systems with return address integrity. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26."},{"key":"e_1_3_2_1_18_1","unstructured":"Amazon. Retrieved July 1 2020. First Prime Air Delievery. https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011.  Amazon. Retrieved July 1 2020. First Prime Air Delievery. https:\/\/www.amazon.com\/Amazon-Prime-Air\/b?node=8037720011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368118"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_1_21_1","volume-title":"Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol.\u00a02010","author":"Bobba B","year":"2010","unstructured":"Rakesh\u00a0 B Bobba , Katherine\u00a0 M Rogers , Qiyan Wang , Himanshu Khurana , Klara Nahrstedt , and Thomas\u00a0 J Overbye . 2010 . Detecting false data injection attacks on dc state estimation . In Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol.\u00a02010 . Rakesh\u00a0B Bobba, Katherine\u00a0M Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt, and Thomas\u00a0J Overbye. 2010. Detecting false data injection attacks on dc state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol.\u00a02010."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium. 161\u2013176","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas\u00a0 R Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity .. In USENIX Security Symposium. 161\u2013176 . Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas\u00a0R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.. In USENIX Security Symposium. 161\u2013176."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2426140"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134640"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the SCADA security scientific symposium, Vol.\u00a046","author":"Cheung Steven","year":"2007","unstructured":"Steven Cheung , Bruno Dutertre , Martin Fong , Ulf Lindqvist , Keith Skinner , and Alfonso Valdes . 2007 . Using model-based intrusion detection for SCADA networks . In Proceedings of the SCADA security scientific symposium, Vol.\u00a046 . Citeseer, 1\u201312. Steven Cheung, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA security scientific symposium, Vol.\u00a046. Citeseer, 1\u201312."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.37"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359847"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_31_1","unstructured":"Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT.  Drew Davidson Hao Wu Robert Jellinek Vikas Singh and Thomas Ristenpart. 2016. Controlling UAVs with Sensor Input Spoofing Attacks.. In WOOT."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307\u2013317","author":"Nguyen\u00a0Quang Do Lisa","year":"2017","unstructured":"Lisa Nguyen\u00a0Quang Do , Karim Ali , Benjamin Livshits , Eric Bodden , Justin Smith , and Emerson Murphy-Hill . 2017 . Just-in-time static analysis . In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307\u2013317 . Lisa Nguyen\u00a0Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. 2017. Just-in-time static analysis. In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307\u2013317."},{"key":"e_1_3_2_1_33_1","volume-title":"Finding structure in time. Cognitive science 14, 2","author":"Elman L","year":"1990","unstructured":"Jeffrey\u00a0 L Elman . 1990. Finding structure in time. Cognitive science 14, 2 ( 1990 ), 179\u2013211. Jeffrey\u00a0L Elman. 1990. Finding structure in time. Cognitive science 14, 2 (1990), 179\u2013211."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.48"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274724"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991126"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8462886"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Felix\u00a0A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).  Felix\u00a0A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to forget: Continual prediction with LSTM. (1999).","DOI":"10.1049\/cp:19991218"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_41_1","unstructured":"Jared Green. Retrieved July 15 2020. Drones Will Elevate Urban Design. https:\/\/www.smartcitiesdive.com\/ex\/sustainablecitiescollective\/drones-will-elevate-urban-design\/1053491\/.  Jared Green. Retrieved July 15 2020. Drones Will Elevate Urban Design. https:\/\/www.smartcitiesdive.com\/ex\/sustainablecitiescollective\/drones-will-elevate-urban-design\/1053491\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_1_43_1","unstructured":"Todd\u00a0E Humphreys Brent\u00a0M Ledvina Mark\u00a0L Psiaki Brady\u00a0W O\u2019Hanlon and Paul\u00a0M Kintner. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings.  Todd\u00a0E Humphreys Brent\u00a0M Ledvina Mark\u00a0L Psiaki Brady\u00a0W O\u2019Hanlon and Paul\u00a0M Kintner. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"e_1_3_2_1_45_1","volume-title":"Icsref: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478(2018).","author":"Keliris Anastasis","year":"2018","unstructured":"Anastasis Keliris and Michail Maniatakos . 2018 . Icsref: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478(2018). Anastasis Keliris and Michail Maniatakos. 2018. Icsref: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478(2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_47_1","unstructured":"Chung\u00a0Hwan Kim Taegyu Kim Hongjun Choi Zhongshu Gu Byoungyoung Lee Xiangyu Zhang and Dongyan Xu. [n.d.]. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. ([n.\u00a0d.]).  Chung\u00a0Hwan Kim Taegyu Kim Hongjun Choi Zhongshu Gu Byoungyoung Lee Xiangyu Zhang and Dongyan Xu. [n.d.]. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_48_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 913\u2013930.","author":"Kim Taegyu","unstructured":"Taegyu Kim , Chung\u00a0Hwan Kim , Altay Ozen , Fan Fei , Zhan Tu , Xiangyu Zhang , Xinyan Deng , Dave\u00a0Jing Tian , and Dongyan Xu. 2020. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with {MAYDAY} . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 913\u2013930. Taegyu Kim, Chung\u00a0Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave\u00a0Jing Tian, and Dongyan Xu. 2020. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with {MAYDAY}. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 913\u2013930."},{"key":"e_1_3_2_1_49_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 425\u2013442.","author":"Kim Taegyu","unstructured":"Taegyu Kim , Chung\u00a0Hwan Kim , Junghwan Rhee , Fan Fei , Zhan Tu , Gregory Walkup , Xiangyu Zhang , Xinyan Deng , and Dongyan Xu. 2019. RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 425\u2013442. Taegyu Kim, Chung\u00a0Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu. 2019. RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 425\u2013442."},{"key":"e_1_3_2_1_50_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014). Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Machine Learning. PMLR, 5338\u20135348","author":"Koh Pang\u00a0Wei","year":"2020","unstructured":"Pang\u00a0Wei Koh , Thao Nguyen , Yew\u00a0Siang Tang , Stephen Mussmann , Emma Pierson , Been Kim , and Percy Liang . 2020 . Concept bottleneck models . In International Conference on Machine Learning. PMLR, 5338\u20135348 . Pang\u00a0Wei Koh, Thao Nguyen, Yew\u00a0Siang Tang, Stephen Mussmann, Emma Pierson, Been Kim, and Percy Liang. 2020. Concept bottleneck models. In International Conference on Machine Learning. PMLR, 5338\u20135348."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989440"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007754"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Stephen\u00a0E McLaughlin Saman\u00a0A Zonouz Devin\u00a0J Pohly and Patrick\u00a0D McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code.. In NDSS Vol.\u00a014.  Stephen\u00a0E McLaughlin Saman\u00a0A Zonouz Devin\u00a0J Pohly and Patrick\u00a0D McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code.. In NDSS Vol.\u00a014.","DOI":"10.14722\/ndss.2014.23043"},{"key":"e_1_3_2_1_58_1","volume-title":"Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498.","author":"Noorman Job","year":"2013","unstructured":"Job Noorman , Pieter Agten , Wilfried Daniels , Raoul Strackx , Anthony Van\u00a0Herrewege , Christophe Huygens , Bart Preneel , Ingrid Verbauwhede , and Frank Piessens . 2013 . Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van\u00a0Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498."},{"key":"e_1_3_2_1_59_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 895\u2013912.","author":"Quinonez Raul","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . 2020. {SAVIOR} : Securing Autonomous Vehicles with Robust Physical Invariants . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 895\u2013912. Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. {SAVIOR}: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 895\u2013912."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2008.4738703"},{"key":"e_1_3_2_1_61_1","volume-title":"First Workshop on Secure Control Systems (SCS)","author":"Sandberg Henrik","year":"2010","unstructured":"Henrik Sandberg , Andr\u00e9 Teixeira , and Karl\u00a0 H Johansson . 2010 . On security indices for state estimators in power networks . In First Workshop on Secure Control Systems (SCS) , Stockholm , 2010. Henrik Sandberg, Andr\u00e9 Teixeira, and Karl\u00a0H Johansson. 2010. On security indices for state estimators in power networks. In First Workshop on Secure Control Systems (SCS), Stockholm, 2010."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2303131"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_68_1","volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 881\u2013896.","author":"Son Yunmok","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Youngseok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , and Yongdae Kim . 2015. Rocking drones with intentional sound noise on gyroscopic sensors . In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881\u2013896. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881\u2013896."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00045"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_71_1","volume-title":"2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 3282\u20133287","author":"Talebi HA","year":"2006","unstructured":"HA Talebi and RV Patel . 2006 . An intelligent fault detection and recovery scheme for reaction wheel actuator of satellite attitude control systems . In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 3282\u20133287 . HA Talebi and RV Patel. 2006. An intelligent fault detection and recovery scheme for reaction wheel actuator of satellite attitude control systems. In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 3282\u20133287."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_7"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2007.4282182"},{"key":"e_1_3_2_1_76_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN","author":"Xia Yubin","year":"2012","unstructured":"Yubin Xia , Yutao Liu , Haibo Chen , and Binyu Zang . 2012 . CFIMon: Detecting violation of control flow integrity using performance counters . In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1\u201312. Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1\u201312."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the 20th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems","author":"S.","year":"2019","unstructured":"S. \u00a0Bharadwaj Yadavalli and Aaron Smith. 2019. Raising Binaries to LLVM IR with MCTOLL (WIP Paper) . In Proceedings of the 20th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems ( Phoenix, AZ, USA) (LCTES 2019 ). Association for Computing Machinery, New York, NY, USA, 213\u2013218. https:\/\/doi.org\/10.1145\/3316482.3326354 S.\u00a0Bharadwaj Yadavalli and Aaron Smith. 2019. Raising Binaries to LLVM IR with MCTOLL (WIP Paper). In Proceedings of the 20th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (Phoenix, AZ, USA) (LCTES 2019). Association for Computing Machinery, New York, NY, USA, 213\u2013218. https:\/\/doi.org\/10.1145\/3316482.3326354"},{"key":"e_1_3_2_1_79_1","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan , Wenyuan Xu , and Jianhao Liu . 2016 . Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle . DEF CON 24 , 8 (2016), 109 . Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24, 8 (2016), 109.","journal-title":"DEF CON"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055010"},{"key":"e_1_3_2_1_81_1","volume-title":"Silhouette: Efficient protected shadow stacks for embedded systems. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1219\u20131236.","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou , Yufei Du , Zhuojia Shen , Lele Ma , John Criswell , and Robert\u00a0 J Walls . 2020 . Silhouette: Efficient protected shadow stacks for embedded systems. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1219\u20131236. Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert\u00a0J Walls. 2020. Silhouette: Efficient protected shadow stacks for embedded systems. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1219\u20131236."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2196432"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2217762"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","location":"San Sebastian Spain","acronym":"RAID '21"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471869","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":84,"alternative-id":["10.1145\/3471621.3471869","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471869","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}