Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354195
|View full text |Cite
|
Sign up to set email alerts
|

Trick or Heat?

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…The authors are able to cause interruptions in a CIED, as well as dominate true signals in an ECG while using only 50 mW to transmit. A more recent paper using EMI to attack sensors, trick or heat [59], focuses on the effect of EMI on temperature sensors. In this work, Tu et al can alter the temperature of baby incubators from a distance, even through walls, with a small hand-held device.…”
Section: Signal Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors are able to cause interruptions in a CIED, as well as dominate true signals in an ECG while using only 50 mW to transmit. A more recent paper using EMI to attack sensors, trick or heat [59], focuses on the effect of EMI on temperature sensors. In this work, Tu et al can alter the temperature of baby incubators from a distance, even through walls, with a small hand-held device.…”
Section: Signal Attacksmentioning
confidence: 99%
“…They report that this defense can be easily and cheaply applied to almost any system and has a true positive detection rate of 100% [70]. This would be highly effective when deployed against the exploit in trick or heat [59] as it would filter malicious signals injected.…”
Section: Signal Attack Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, if the attack goal is to inject a precise waveform into the sensing system to incite a specific response from the system, the down-converted signal must closely resemble a sensor output that is known to trigger some desired behavior in the system [75] [98] [99] [100]. Thus, the injected out-of-band signal must be shaped such that when it is downconverted, it is transformed into the attacker's desired sensor output.…”
Section: Techniques For Out-of-band Signal Injectionmentioning
confidence: 99%
“…Temperature Sensor as Target: Tu et al [100] show that they can use EMI signals to inject spoofed readings into various temperature sensors. In this attack, they are able to manipulate temperature sensor readings by taking advantage of the amplifier without tampering with the system or triggering any alarms related to abnormal temperatures.…”
Section: Signal Injection Attacks: Known Attacksmentioning
confidence: 99%