Sensing & Actuation Actuation and decision-making based on sensor dala
3
Sensor & Security Many prevention and detection mechanisms For malicious network trattos
4
Attack Vectors of Sensors
5
Heart Rate Sensor Spoofing
6
Target: Medical Infusion Pump
7
Sensor Saturation o New type of sensor spoofing attack using saturation
8
Infusion Pump and Drop Sensor
9
Over and Under Infusion
10
Experimental Setting
11
Demo (Over-infusion)
12
Defense for Sensor Saturation
13
Drone Controlling
14
Gyroscope on Drone
15
Experimental Results Found the resonant frequencies of 7 MEMS gyroscopes Not found for 8 MEMS gyroscopes
16
Shutting Down Drones
17
Attack Demo
18
Remote Drone Attack
19
Signal Injection using EMI
20
Cardiac Implantable Devices
21
Application to medical devices
22
Standard Lead Design
23
Example
24
Conclusion
Description:
Explore a 21-minute conference talk from USENIX Enigma 2017 that delves into the vulnerabilities of sensors in safety-critical systems. Learn how Professor Yongdae Kim from KAIST examines the potential for sensor spoofing and manipulation in devices such as self-driving cars, drones, and medical equipment. Discover various attack vectors, including heart rate sensor spoofing, sensor saturation in medical infusion pumps, and gyroscope manipulation in drones. Gain insights into the experimental results of testing MEMS gyroscopes and the implications for drone control. Understand the risks associated with signal injection using EMI and its application to cardiac implantable devices. Conclude with potential defense strategies and open problems in sensor security, providing valuable knowledge for professionals and enthusiasts in the field of cybersecurity and embedded systems.