From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments

AZ Mohammed, L Jenkins, R Hatch… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Sensing data integrity in a cyber-physical system (CPS) is critical to its safe operation.
Intolerable data manipulation can potentially lead to very hazardous consequences …

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR

Z **, Q Jiang, X Lu, C Yan, X Ji, W Xu - arxiv preprint arxiv:2409.17907, 2024 - arxiv.org
LiDAR (Light Detection and Ranging) is a pivotal sensor for autonomous driving, offering
precise 3D spatial information. Previous signal attacks against LiDAR systems mainly exploit …

A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield

R Geng, J Wang, Y Yuan, F Zhan, T Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Wireless sensing technology has become prevalent in healthcare, smart homes, and
autonomous driving due to its non-contact operation, penetration capabilities, and cost …