Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243752
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Attacks Against Robotic Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 141 publications
(69 citation statements)
references
References 43 publications
0
66
0
Order By: Relevance
“…Record D, and the following trajectory as track [1]; 8: end if 9: end while 10: Reset: R a moves to a posture p a such that R a is in R v 's +90 • direction with distance = D, i.e., α 1 = θ + 90 • ; 11: while ∆θ = 0 do 12:…”
Section: B Intentional-learning: Trajectory Trialmentioning
confidence: 99%
See 2 more Smart Citations
“…Record D, and the following trajectory as track [1]; 8: end if 9: end while 10: Reset: R a moves to a posture p a such that R a is in R v 's +90 • direction with distance = D, i.e., α 1 = θ + 90 • ; 11: while ∆θ = 0 do 12:…”
Section: B Intentional-learning: Trajectory Trialmentioning
confidence: 99%
“…Due to the increasing usage of mobile robots in a wide range of application domains, the security issue has become an essential requirement and imperative challenge [1]. The security shows the ability of a system to govern malicious behaviors or unanticipated events [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Attacks also target robotic vehicles like drones and ground rovers. 7 Choi et al consider robotic vehicles as a type of cyber-physical systems that consist of both cyber and physical components working jointly to support the vehicle's operations in the physical world. The authors enumerate many cases (eg, GPS spoofing and ABS tampering) that show how vulnerable robotic vehicles are to attacks and suggest an invariant approach to address some vulnerabilities.…”
Section: Security Of Iot In Briefmentioning
confidence: 99%
“…Similar news is reported in the automotive industry when a Jeep Cherokee was hijacked turning off the transmission while the vehicle was on the freeway. Attacks also target robotic vehicles like drones and ground rovers . Choi et al consider robotic vehicles as a type of cyber‐physical systems that consist of both cyber and physical components working jointly to support the vehicle's operations in the physical world.…”
Section: Introductionmentioning
confidence: 99%