A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020‏ - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

Taxonomy and challenges of out-of-band signal injection attacks and defenses

I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019‏ - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …

[PDF][PDF] Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.

JH Jang, M Cho, J Kim, D Kim, Y Kim - NDSS, 2023‏ - cybershafarat.com
An inertial measurement unit (IMU) takes the key responsibility for the attitude control of
drones. It comprises various sensors and transfers sensor data to the drone's control unit. If it …

Security and privacy in the emerging cyber-physical world: A survey

Z Yu, Z Kaplan, Q Yan, N Zhang - … Communications Surveys & …, 2021‏ - ieeexplore.ieee.org
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …

[PDF][PDF] Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards

Q Jiang, Y Ren, Y Long, C Yan, Y Sun… - Network and …, 2024‏ - researchgate.net
Keyboards are the primary peripheral input devices for various critical computer application
scenarios. This paper performs a security analysis of the keyboard sensing mechanisms and …

EMI-LiDAR: Uncovering vulnerabilities of LiDAR sensors in autonomous driving setting using electromagnetic interference

SHV Bhupathiraju, J Sheldon, LA Bauer… - Proceedings of the 16th …, 2023‏ - dl.acm.org
Autonomous Vehicles (AVs) using LiDAR-based object detection systems are rapidly
improving and becoming an increasingly viable method of transportation. While effective at …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023‏ - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …

A survey on security issues in modern Implantable Devices: Solutions and future issues

E Kwarteng, M Cebe - Smart Health, 2022‏ - Elsevier
Abstract Implantable Medical Devices (IMD) is a fast pace growing medical field and
continues to grow in the foreseeable future. Advancement in science and technology has led …

{Physical-Layer} attacks against pulse width {Modulation-Controlled} actuators

GY Dayanıklı, S Sinha, D Muniraj, RM Gerdes… - 31st USENIX Security …, 2022‏ - usenix.org
Cyber-physical systems (CPS) consist of integrated computational and physical
components. The dynamics of physical components (eg, a robot arm) are controlled by …

SoK: Rethinking sensor spoofing attacks against robotic vehicles from a systematic view

Y Xu, X Han, G Deng, J Li, Y Liu… - 2023 IEEE 8th European …, 2023‏ - ieeexplore.ieee.org
Robotic Vehicles (RVs) have gained great popularity over the past few years. Meanwhile,
they are also demonstrated to be vulnerable to sensor spoofing attacks. Although a wealth of …