- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
30
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Chen, Zeyuan (2)
-
Halperin, Eran (2)
-
Rahmani, Elior (2)
-
Adamson, Paul C. (1)
-
An, Ulzee (1)
-
Balliu, Brunilda (1)
-
Botting, Patrick (1)
-
Brook, Rachel (1)
-
Chen, Qi Alfred (1)
-
Chen, Zeyuan Johnson (1)
-
Chiang, Jeffrey N. (1)
-
Ebinger, Joseph (1)
-
Eskin, Eleazar (1)
-
Fulcher, Jennifer A. (1)
-
Goodman-Meza, David (1)
-
Hill, Brian L. (1)
-
Jew, Brandon (1)
-
Kordi, Misagh (1)
-
Manuel, Vladimir (1)
-
Rudas, Akos (1)
-
- Filter by Editor
-
-
Urbanowicz, Ryan J. (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Higgins, A. (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
:Chaosong Huang, Gang Lu (0)
-
A. Beygelzimer (0)
-
A. E. Lischka, E.B. Dyer (0)
-
A. Ghate, K. Krishnaiyer (0)
-
A. Higgins (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
For high-level Autonomous Vehicles (AV), localization is highly security and safety critical. One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use Multi-Sensor Fusion (MSF) algorithms that are generally believed to have the potential to practically defeat GPS spoofing. However, no prior work has studied whether today’s MSF algorithms are indeed sufficiently secure under GPS spoofing, especially in AV settings. In this work, we perform the first study to fill this critical gap. As the first study, we focus on a production-grade MSF with both design and implementation level representativeness, and identify two AV-specific attack goals, off-road and wrong-way attacks. To systematically understand the security property, we first analyze the upper-bound attack effectiveness, and discover a take-over effect that can fundamentally defeat the MSF design principle. We perform a cause analysis and find that such vulnerability only appears dynamically and non-deterministically. Leveraging this insight, we design FusionRipper, a novel and general attack that opportunistically captures and exploits take-over vulnerabilities. We evaluate it on 6 real-world sensor traces, and find that FusionRipper can achieve at least 97% and 91.3% success rates in all traces for off-road and wrongway attacks respectively. We also find that it ismore »
-
Thompson, Mike ; Chen, Zeyuan Johnson ; Rahmani, Elior ; Halperin, Eran ( , Genome Biology)
-
Goodman-Meza, David ; Rudas, Akos ; Chiang, Jeffrey N. ; Adamson, Paul C. ; Ebinger, Joseph ; Sun, Nancy ; Botting, Patrick ; Fulcher, Jennifer A. ; Saab, Faysal G. ; Brook, Rachel ; et al ( , PLOS ONE)Urbanowicz, Ryan J. (Ed.)