2017 IEEE European Symposium on Security and Privacy (EuroS&P) 2017
DOI: 10.1109/eurosp.2017.42
|View full text |Cite
|
Sign up to set email alerts
|

WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
158
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 195 publications
(167 citation statements)
references
References 13 publications
0
158
0
1
Order By: Relevance
“…In short, we find that ICT systems essentially consist of a layered ecosystem of technologies and hardware that have many security vulnerabilities whose source or number may be impossible to assess (e.g. Shin et al, 2015;Trippel et al, 2017). Under these circumstances, the state of cyber security can be described as being in a ''shameful state of unpreparedness'' (Arquilla, 2017, p. 10).…”
Section: The Problem Of Software For Iotmentioning
confidence: 99%
“…In short, we find that ICT systems essentially consist of a layered ecosystem of technologies and hardware that have many security vulnerabilities whose source or number may be impossible to assess (e.g. Shin et al, 2015;Trippel et al, 2017). Under these circumstances, the state of cyber security can be described as being in a ''shameful state of unpreparedness'' (Arquilla, 2017, p. 10).…”
Section: The Problem Of Software For Iotmentioning
confidence: 99%
“…To motivate our definition, the term injection was chosen because it captures the fact that values reported by a system are altered; it is not channel-specific; and it has already been adopted by different works [5], [11], [13], [35]- [44]. The out-of-band qualifier is necessary to distinguish the attacks studied in this survey from signal injection attacks on sensors using pulse reflections such as LiDARs [9], [14], [31], signal injection attacks on the physical layer of communication protocols [45], and false data injection attacks [28], [46].…”
Section: Choice Of Terminologymentioning
confidence: 99%
“…The term (sensor) spoofing [8], [9], [14], [43] was also Injection [5], [13], [35], [38], [41]- [44] Intentional Interference [5], [10], [12], [36], [38], [40], [42], [49] Non-Linearity [11], [54], [55], [68] Spoofing [8], [9], [14], [43] Other (See Text) [7], [53], [67] avoided for similar reasons: it has an overloaded meaning in authentication contexts and with in-band signal injection attacks [6], [52]. Moreover, it does not capture the physical aspect of injections, and does not accurately describe coarsegrained attacks which lead to saturation of a sensor.…”
Section: Choice Of Terminologymentioning
confidence: 99%
See 1 more Smart Citation
“…However, the multi-electrode EMG sensor [52] is sizable and must be placed close to muscles. Walking to generate keys [48] may be inconvenient and the used inertial measurement units (IMUs) may be vulnerable to remote acoustic attack [41].…”
Section: Related Workmentioning
confidence: 99%