{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:03:41Z","timestamp":1766484221545,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Texas at Dallas Office of Research","award":["9397"],"award-info":[{"award-number":["9397"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563551","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3503-3505","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Kyeongseok","family":"Yang","sequence":"first","affiliation":[{"name":"Korea University, Seoul, South Korea"}]},{"given":"Sudharssan","family":"Mohan","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Yonghwi","family":"Kwon","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, South Korea"}]},{"given":"Chung Hwan","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ardupilot. 2022. https:\/\/ardupilot.org\/.  Ardupilot. 2022. https:\/\/ardupilot.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Gazebo. 2022. https:\/\/gazebosim.org.  Gazebo. 2022. https:\/\/gazebosim.org."},{"key":"e_1_3_2_1_3_1","unstructured":"The Guardian. 2009. US drones hacked by Iraqi insurgents. https:\/\/www.theguardian.com\/world\/2009\/dec\/17\/skygrabber-american-drones-hacked.  The Guardian. 2009. US drones hacked by Iraqi insurgents. https:\/\/www.theguardian.com\/world\/2009\/dec\/17\/skygrabber-american-drones-hacked."},{"key":"e_1_3_2_1_4_1","author":"BBC","year":"2014","unstructured":"BBC News. 2014 . Military and civilian drones have a crucial weakness that means they can be hacked. https:\/\/www.bbc.com\/future\/article\/20140206-can-drones-be-hacked. BBC News. 2014. Military and civilian drones have a crucial weakness that means they can be hacked. https:\/\/www.bbc.com\/future\/article\/20140206-can-drones-be-hacked.","journal-title":"News."},{"key":"e_1_3_2_1_5_1","author":"Fox","year":"2015","unstructured":"Fox News. 2015 . Drones vulnerable to terrorist hijacking, researchers says. https:\/\/www.foxnews.com\/tech\/exclusive-drones-vulnerable-to-terrorist-hijacking-researchers-say. Fox News. 2015. Drones vulnerable to terrorist hijacking, researchers says. https:\/\/www.foxnews.com\/tech\/exclusive-drones-vulnerable-to-terrorist-hijacking-researchers-say.","journal-title":"News."},{"key":"e_1_3_2_1_6_1","unstructured":"SITL Simulator. 2022. https:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html.  SITL Simulator. 2022. https:\/\/ardupilot.org\/dev\/docs\/sitl-simulator-software-in-the-loop.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Yunmok Son Hocheol Shin Dongkwan Kim Youngseok Park Juhwan Noh Kibum Choi Jungwoo Choi and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In USENIX Security'15.  Yunmok Son Hocheol Shin Dongkwan Kim Youngseok Park Juhwan Noh Kibum Choi Jungwoo Choi and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In USENIX Security'15."},{"key":"e_1_3_2_1_8_1","volume-title":"WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Euro S&P'17","author":"Trippel Timothy","year":"2017","unstructured":"Timothy Trippel , Ofir Weisse , Wenyuan Xu , Peter Honeyman , and Kevin Fu . 2017 . WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Euro S&P'17 . IEEE. Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Euro S&P'17. IEEE."},{"key":"e_1_3_2_1_9_1","unstructured":"Yazhou Tu Zhiqiang Lin Insup Lee and Xiali Hei. 2018. Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors. In USENIX Security'19.  Yazhou Tu Zhiqiang Lin Insup Lee and Xiali Hei. 2018. Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors. In USENIX Security'19."},{"key":"e_1_3_2_1_10_1","unstructured":"Zhengbo Wang Kang Wang Bo Yang Shangyuan Li and Aimin Pan. 2017. Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. In Black Hat USA.  Zhengbo Wang Kang Wang Bo Yang Shangyuan Li and Aimin Pan. 2017. Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. In Black Hat USA."},{"key":"e_1_3_2_1_11_1","volume-title":"Sok: A minimalist approach to formalizing analog sensor security","author":"Yan Chen","year":"2020","unstructured":"Chen Yan , Hocheol Shin , Connor Bolton , Wenyuan Xu , Yongdae Kim , and Kevin Fu . 2020 . Sok: A minimalist approach to formalizing analog sensor security . In IEEE S&P'20. IEEE. Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu. 2020. Sok: A minimalist approach to formalizing analog sensor security. In IEEE S&P'20. IEEE."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563551","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563551"}},"subtitle":["Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":11,"alternative-id":["10.1145\/3548606.3563551","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563551","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}