{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:24:00Z","timestamp":1766067840406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OIA-1946231, CNS-2117785, OIA-2229752, CNS-2231682"],"award-info":[{"award-number":["OIA-1946231, CNS-2117785, OIA-2229752, CNS-2231682"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605758.3623494","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:52:11Z","timestamp":1700704331000},"page":"39-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7640-1829","authenticated-orcid":false,"given":"Yazhou","family":"Tu","sequence":"first","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3630-6269","authenticated-orcid":false,"given":"Sara","family":"Rampazzi","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2438-5430","authenticated-orcid":false,"given":"Xiali","family":"Hei","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"volume-title":"Problems with the Anti-aliasing Filter. https:\/\/ccrma.stanford.edu\/CCRMA\/ Courses\/252\/sensors\/node35.html. Tim Stilson","year":"1996","key":"e_1_3_2_1_1_1","unstructured":"1996. Problems with the Anti-aliasing Filter. https:\/\/ccrma.stanford.edu\/CCRMA\/ Courses\/252\/sensors\/node35.html. Tim Stilson, 1996--10--17."},{"key":"e_1_3_2_1_2_1","unstructured":"2012. STMicroelectronics LSM330 datasheet. www.st.com\/resource\/en\/datasheet\/ dm00037200.pdf. Accessed: 2018-06--14."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. STMicroelectronics L3GD20 datasheet. http:\/\/www.st.com\/en\/mems-andsensors\/l3gd20.html. Accessed: 2017-06--12."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. L. Corporation LRAD 2000X datasheet. https:\/\/genasys.com\/wp-content\/ uploads\/2015\/06\/LRAD_Datasheet_2000X.pdf. Accessed: 2022-01--12."},{"volume-title":"Boston Dynamics' Handle robot brings mobile manipulation to logistics. https:\/\/www.therobotreport.com\/boston-dynamics-handle-robot-pallets\/. Steve Crowe","year":"2019","key":"e_1_3_2_1_5_1","unstructured":"2019. Boston Dynamics' Handle robot brings mobile manipulation to logistics. https:\/\/www.therobotreport.com\/boston-dynamics-handle-robot-pallets\/. Steve Crowe, 2019-03--28."},{"volume-title":"Handle - ROBOTS. Boston Dynamics. https:\/\/robots.ieee.org\/robots\/handle\/","year":"2019","key":"e_1_3_2_1_6_1","unstructured":"2019. Handle - ROBOTS. Boston Dynamics. https:\/\/robots.ieee.org\/robots\/handle\/. 2019."},{"volume-title":"DJI Osmo Mobile 3 review. https:\/\/www.techradar.com\/reviews\/dji-osmomobile-3-review. Basil Kronfli","year":"2020","key":"e_1_3_2_1_7_1","unstructured":"2020. DJI Osmo Mobile 3 review. https:\/\/www.techradar.com\/reviews\/dji-osmomobile-3-review. Basil Kronfli, 2020-01--15."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Myskunkworks 10\" Long-Range Horn. http:\/\/myskunkworks.net\/index. php?route=product\/product&path=61&product_id=63. Accessed: 2021-05-05."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. An open-source parabolic reflector design. https:\/\/www.thingiverse.com\/ thing:2721955. Accessed: 2021-08--28."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. UltraElectronics HyperShield datasheet. https:\/\/www.nixalite.com\/ SiteContent\/Documents\/PDFs\/HyperShield.pdf. Accessed: 2022-01-07"},{"key":"e_1_3_2_1_11_1","unstructured":"2023. Advanced Linux Sound Architecture (ALSA) project homepage. https: \/\/www.alsa-project.org\/wiki\/Main_Page."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. DIRECTIONAL MICROPHONE FOR LONG-RANGE SURVEILLANCE. https:\/\/ampflab.com\/. Accessed: 2023-08--28."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/08929880108426495"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Riccardo Antonello Roberto Oboe et al. 2011. MEMS gyroscopes for consumers and industrial applications. InTech.","DOI":"10.5772\/17689"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1515\/JPM.2009.109"},{"key":"e_1_3_2_1_16_1","volume-title":"Servocontrol: Incubator and radiant warmer. Iowa Neonatology Handbook","author":"Bell Edward F","year":"2006","unstructured":"Edward F Bell. 2006. Servocontrol: Incubator and radiant warmer. Iowa Neonatology Handbook (2006)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFOST.2014.6991151"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00050"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00032"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2007.4374812"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"M. Sami Fadali and Antonio Visioli. 2020. Chapter 12 - Practical issues. In Digital Control Engineering (Third Edition) (third edition ed.) M. Sami Fadali and Antonio Visioli (Eds.). Academic Press 567--614. https:\/\/doi.org\/10.1016\/B978-0- 12--814433--6.00012-0","DOI":"10.1016\/B978-0-"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0041-624X(78)90053-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_25"},{"key":"e_1_3_2_1_28_1","first-page":"692","article-title":"Glucose monitorying method and system","volume":"16","author":"Hei Xiali","year":"2021","unstructured":"Xiali Hei and Yazhou Tu. 2021. Glucose monitorying method and system. US Patent App. 16\/952,692.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.34133\/cbsystems.0014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591197.3591304"},{"key":"e_1_3_2_1_31_1","volume-title":"2021 IEEE Symposium on Security and Privacy (SP). IEEE.","author":"Ji Xiaoyu","year":"2020","unstructured":"Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, and Kevin Fu. 20201. Poltergeist: Acoustic Adversarial Machine Learning against Cameras and ComputerVision. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485389"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_3_2_1_34_1","unstructured":"PK Kavale Mohini Amritkar and Sakshi Joshi. 2022. DESIGN AND DEVELOPMENT OF SELF BALANCING PLATFORM. (2022)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793792"},{"key":"e_1_3_2_1_36_1","volume-title":"Signal Injection Attacks against CCD Image Sensors. arXiv preprint arXiv:2108.08881","author":"K\u00f6hler Sebastian","year":"2021","unstructured":"Sebastian K\u00f6hler, Richard Baker, and Ivan Martinovic. 2021. Signal Injection Attacks against CCD Image Sensors. arXiv preprint arXiv:2108.08881 (2021)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-55.3.112"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.391370"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196506"},{"key":"e_1_3_2_1_41_1","volume-title":"A critical review of MEMS gyroscopes technology and commercialization status. (2009). InvenSense whitepaper","author":"Nasiri Steven","year":"2009","unstructured":"Steven Nasiri. 2009. A critical review of MEMS gyroscopes technology and commercialization status. (2009). InvenSense whitepaper (2009)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17102284"},{"key":"e_1_3_2_1_43_1","volume-title":"History of sound recording and analysis equipment. Exploring Animal Behavior Through Sound: Volume 1: Methods","author":"Pavan Gianni","year":"2022","unstructured":"Gianni Pavan, Gregory Budney, Holger Klinck, Herv\u00e9 Glotin, Dena J Clink, and Jeanette A Thomas. 2022. History of sound recording and analysis equipment. Exploring Animal Behavior Through Sound: Volume 1: Methods (2022), 1--36."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-021-01462-5"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"e_1_3_2_1_46_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15). 881--896."},{"key":"e_1_3_2_1_47_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light commands: laser-based audio injection attacks on voice-controllable systems. In 29th USENIX Security Symposium (USENIX Security 20). 2631--2648."},{"key":"e_1_3_2_1_48_1","volume-title":"Age variation in the upper limit of hearing. European journal of applied physiology and occupational physiology 65, 5","author":"Takeda Shintaro","year":"1992","unstructured":"Shintaro Takeda, Ikuharu Morioka, Kazuhisa Miyashita, Akeharu Okumura, Yoshiaki Yoshida, and Kenji Matsumoto. 1992. Age variation in the upper limit of hearing. European journal of applied physiology and occupational physiology 65, 5 (1992), 403--408."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103904"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16040440"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_52_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Tu Yazhou","year":"2018","unstructured":"Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors. In 27th USENIX Security Symposium (USENIX Security 18). 1545--1562."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453097"},{"key":"e_1_3_2_1_55_1","volume-title":"GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. arXiv preprint arXiv:2202.02585","author":"Wang Yuanda","year":"2022","unstructured":"Yuanda Wang, Hanqing Guo, and Qiben Yan. 2022. GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. arXiv preprint arXiv:2202.02585 (2022)."},{"key":"e_1_3_2_1_56_1","volume-title":"Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. BlackHat USA","author":"Wang Zhengbo","year":"2017","unstructured":"Zhengbo Wang, Kang Wang, Bo Yang, Shangyuan Li, and Aimin Pan. 2017. Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. BlackHat USA (2017)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3058585"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24068"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 5th Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605758.3623494","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605758.3623494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:10Z","timestamp":1750178770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":60,"alternative-id":["10.1145\/3605758.3623494","10.1145\/3605758"],"URL":"https:\/\/doi.org\/10.1145\/3605758.3623494","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}