{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:59Z","timestamp":1750220099982,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["11288S170484-102"],"award-info":[{"award-number":["11288S170484-102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3529659","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"298-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Shah","sequence":"first","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Chuadhry Mujeeb","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Shishir","family":"Nagaraja","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1097\/00003086-199809000-00011"},{"key":"e_1_3_2_1_3_1","volume-title":"To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots. arXiv preprint arXiv:1504.04339","author":"Bonaci Tamara","year":"2015","unstructured":"Tamara Bonaci , Jeffrey Herron , Tariq Yusuf , Junjie Yan , Tadayoshi Kohno , and Howard Jay Chizeck . 2015. To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots. arXiv preprint arXiv:1504.04339 ( 2015 ). Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, and Howard Jay Chizeck. 2015. To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots. arXiv preprint arXiv:1504.04339 (2015)."},{"volume-title":"10th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 20).","author":"Bushart Jonas","key":"e_1_3_2_1_4_1","unstructured":"Jonas Bushart and Christian Rossow . 2020. Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted {DNS} . In 10th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 20). Jonas Bushart and Christian Rossow. 2020. Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted {DNS}. In 10th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 20)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6974245"},{"key":"e_1_3_2_1_6_1","volume-title":"Scanning the internet for ros: A view of security in robotics research. arXiv preprint arXiv:1808.03322","author":"DeMarinis Nicholas","year":"2018","unstructured":"Nicholas DeMarinis , Stefanie Tellex , Vasileios Kemerlis , George Konidaris , and Rodrigo Fonseca . 2018. Scanning the internet for ros: A view of security in robotics research. arXiv preprint arXiv:1808.03322 ( 2018 ). Nicholas DeMarinis, Stefanie Tellex, Vasileios Kemerlis, George Konidaris, and Rodrigo Fonseca. 2018. Scanning the internet for ros: A view of security in robotics research. arXiv preprint arXiv:1808.03322 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232420"},{"volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 717--734.","author":"Gong Jiajun","key":"e_1_3_2_1_8_1","unstructured":"Jiajun Gong and Tao Wang . 2020. Zero-delay lightweight defenses against website fingerprinting . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 717--734. Jiajun Gong and Tao Wang. 2020. Zero-delay lightweight defenses against website fingerprinting. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 717--734."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of SICE Annual Conference 2010","author":"Goto Satoru","year":"2010","unstructured":"Satoru Goto , Takuya Naka , Yoshitaka Matsuda , and Naruto Egashira . 2010 . Teleoperation System of Robot arms combined with remote control and visual servo control . In Proceedings of SICE Annual Conference 2010 . IEEE, 1975--1981. Satoru Goto, Takuya Naka, Yoshitaka Matsuda, and Naruto Egashira. 2010. Teleoperation System of Robot arms combined with remote control and visual servo control. In Proceedings of SICE Annual Conference 2010. IEEE, 1975--1981."},{"key":"e_1_3_2_1_10_1","volume-title":"239--242","author":"Lasi Heiner","year":"2014","unstructured":"Heiner Lasi , Peter Fettke , Hans-Georg Kemper , Thomas Feld , and Michael Hoffmann . 2014. Industry 4.0. Business & information systems engineering, Vol. 6, 4 ( 2014 ), 239--242 . Heiner Lasi, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. 2014. Industry 4.0. Business & information systems engineering, Vol. 6, 4 (2014), 239--242."},{"key":"e_1_3_2_1_11_1","unstructured":"U.S. Department of Health and Human Services (HHS). 2013. Guidance to Render Unsecured Protected Health Information Unusable Unreadable or Indecipherable to Unauthorized Individuals. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/guidance\/index.html.  U.S. Department of Health and Human Services (HHS). 2013. Guidance to Render Unsecured Protected Health Information Unusable Unreadable or Indecipherable to Unauthorized Individuals. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/guidance\/index.html."},{"key":"e_1_3_2_1_12_1","unstructured":"THE EUROPEAN PARLIAMENT and THE COUNCIL OF THE EUROPEAN UNION. 2017. \"Medical Device Regulations -- Official Journal of the European Union. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32017R0745.  THE EUROPEAN PARLIAMENT and THE COUNCIL OF THE EUROPEAN UNION. 2017. \"Medical Device Regulations -- Official Journal of the European Union. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32017R0745."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2017.39"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HUMANOIDS.2017.8246965"},{"volume-title":"Human-Robot Collaboration and Sensor-Based Robots in Industrial Applications and ConstructionIn Robotic Building","author":"Salmi Timo","key":"e_1_3_2_1_16_1","unstructured":"Timo Salmi , Jari M Ahola , Tapio Heikkil\u00e4 , Pekka Kilpel\u00e4inen , and Timo Malm . 2018. Human-Robot Collaboration and Sensor-Based Robots in Industrial Applications and ConstructionIn Robotic Building . Springer , 25--52. Timo Salmi, Jari M Ahola, Tapio Heikkil\u00e4, Pekka Kilpel\u00e4inen, and Timo Malm. 2018. Human-Robot Collaboration and Sensor-Based Robots in Industrial Applications and ConstructionIn Robotic Building. Springer, 25--52."},{"key":"e_1_3_2_1_17_1","unstructured":"SAP. 2021. Learn How Industry 4.0 And Robots Strengthen Warehouse Logistics. https:\/\/www.forbes.com\/sites\/sap\/2021\/11\/22\/learn-how-industry-40-and-robots-strengthen-warehouse-logistics.  SAP. 2021. Learn How Industry 4.0 And Robots Strengthen Warehouse Logistics. https:\/\/www.forbes.com\/sites\/sap\/2021\/11\/22\/learn-how-industry-40-and-robots-strengthen-warehouse-logistics."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/rcs.161"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0090-4295(02)01852-6"},{"key":"e_1_3_2_1_20_1","unstructured":"uFactory. [n. d.]. UFACTORY -- uARM. https:\/\/www.ufactory.cc\/pages\/uarm. Last Accessed: 03\/12\/2020.  uFactory. [n. d.]. UFACTORY -- uARM. https:\/\/www.ufactory.cc\/pages\/uarm. Last Accessed: 03\/12\/2020."}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"San Antonio TX USA","acronym":"WiSec '22"},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3529659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":20,"alternative-id":["10.1145\/3507657.3529659","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3529659","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}