Detecting Attacks Against Robotic Vehicles - A Control Invariant Approach

Detecting Attacks Against Robotic Vehicles - A Control Invariant Approach

Association for Computing Machinery (ACM) via YouTube Direct link

Identifying Memory Locations

8 of 15

8 of 15

Identifying Memory Locations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Detecting Attacks Against Robotic Vehicles - A Control Invariant Approach

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Robotic Vehicles (RVS)
  3. 3 Cyber vs. Physical Attacks
  4. 4 Attack Model
  5. 5 Our Control Invariant (CI) Approach
  6. 6 Control Invariant Extraction
  7. 7 Control Loop Reverse Engineering
  8. 8 Identifying Memory Locations
  9. 9 Monitoring Parameter Selection
  10. 10 Evaluation: Subject Vehicles
  11. 11 Simulated Attacks
  12. 12 Evaluation: Effectiveness
  13. 13 Evaluation: Efficiency
  14. 14 Case Study
  15. 15 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.