Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

05/12/2019
by   Kevin Sam Tharayil, et al.
0

Position sensors, such as the gyroscope, the magnetometer and the accelerometer, are found in a staggering variety of devices, from smartphones and UAVs to autonomous robots. Several works have shown how adversaries can mount spoofing attacks to remotely corrupt or even completely control the outputs of these sensors. With more and more critical applications relying on sensor readings to make important decisions, defending sensors from these attacks is of prime importance. In this work we present practical software based defenses against attacks on two common types of position sensors, specifically the gyroscope and the magnetometer. We first characterize the sensitivity of these sensors to acoustic and magnetic adversaries. Next, we present two software-only defenses: a machine learning based single sensor defense, and a sensor fusion defense which makes use of the mathematical relationship between the two sensors. We performed a detailed theoretical analysis of our defenses, and implemented them on a variety of smartphones, as well as on a resource-constrained IoT sensor node. Our defenses do not require any hardware or OS-level modifications, making it possible to use them with existing hardware. Moreover, they provide a high detection accuracy, a short detection time and a reasonable power consumption.

READ FULL TEXT

page 7

page 11

research
08/20/2022

Sensor Security: Current Progress, Research Challenges, and Future Roadmap

Sensors are one of the most pervasive and integral components of today's...
research
09/13/2021

Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models

A critical aspect of autonomous vehicles (AVs) is the object detection s...
research
01/09/2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM

Rowhammer has drawn much attention from both academia and industry in th...
research
01/10/2020

Optimal Sensor Position for a Computer Mouse

Computer mice have their displacement sensors in various locations (cent...
research
04/08/2021

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

Evolving attacks on the vulnerabilities of the computing systems demand ...
research
06/05/2021

Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

In this study, a sensor fusion based GNSS spoofing attack detection fram...
research
07/05/2023

Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES

The various benefits of multi-tenanting, such as higher device utilizati...

Please sign up or login with your details

Forgot password? Click here to reset