Lasers can be used to inject adversarial-controlled signals into sensors used in cyber-physical systems. This capability is often unexpected, use physical mechanisms that were never considered, and exploits the blind trust in sensors. These laser signal injection attacks can allow adversarial influence or even control over a system's perception of the environment, leading to potentially harmful situations. The contributions of this work are the characterizations of laser signal injection in three cyber-physical contexts: LiDAR sensors used in autonomous vehicles, MEMS microphones in voice-controllable systems, and the sensors used in space systems. These characterizations include an in-depth investigation of attacker capabilities, the dev...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing...
Sensors are embedded in security-critical applications from medical devices to nuclear power plants,...
Lasers can be used to inject adversarial-controlled signals into sensors used in cyber-physical syst...
Researchers have demonstrated that a laser beam or a high-frequency electromagnetic (EM) wave can be...
Voice-activated devices such as smart speakers, smart displays, smartphones, etc. have been shown to...
International audienceFor many IoT domains, Machine Learning and more particularly Deep Learning bri...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
Voice commanded systems (VCS) have been proved to be vulnerable to signal in- jections mimicking voi...
ISBN : 978-3-9810801-2-4International audienceLasers can be used by hackers to situations to inject ...
LIDAR – essentially laser radar – is a key technology in the emerging field of autonomous vehicles. ...
Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding miss...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
This research paper is to analyze, that now a day’s security is an important aspect. Technology deve...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing...
Sensors are embedded in security-critical applications from medical devices to nuclear power plants,...
Lasers can be used to inject adversarial-controlled signals into sensors used in cyber-physical syst...
Researchers have demonstrated that a laser beam or a high-frequency electromagnetic (EM) wave can be...
Voice-activated devices such as smart speakers, smart displays, smartphones, etc. have been shown to...
International audienceFor many IoT domains, Machine Learning and more particularly Deep Learning bri...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
From time immemorial, human beings have been forced to protect the fruits of their creativity and en...
Voice commanded systems (VCS) have been proved to be vulnerable to signal in- jections mimicking voi...
ISBN : 978-3-9810801-2-4International audienceLasers can be used by hackers to situations to inject ...
LIDAR – essentially laser radar – is a key technology in the emerging field of autonomous vehicles. ...
Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding miss...
With the increasing popularity of embedded systems, security and privacy concerns poses a huge threa...
This research paper is to analyze, that now a day’s security is an important aspect. Technology deve...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing...
Sensors are embedded in security-critical applications from medical devices to nuclear power plants,...