YoVDO

Detecting Attacks Against Robotic Vehicles - A Control Invariant Approach

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Cybersecurity Courses

Course Description

Overview

Explore a comprehensive approach to detecting cyber and physical attacks on robotic vehicles in this 25-minute conference talk. Delve into the Control Invariant (CI) method, which aims to mitigate the risks of physical malfunction and mission disruption. Learn about attack models, control invariant extraction, control loop reverse engineering, and memory location identification. Discover the process of monitoring parameter selection and evaluate the effectiveness and efficiency of this approach through simulated attacks and case studies. Gain valuable insights into enhancing the security of robotic vehicles against potential threats.

Syllabus

Intro
Robotic Vehicles (RVS)
Cyber vs. Physical Attacks
Attack Model
Our Control Invariant (CI) Approach
Control Invariant Extraction
Control Loop Reverse Engineering
Identifying Memory Locations
Monitoring Parameter Selection
Evaluation: Subject Vehicles
Simulated Attacks
Evaluation: Effectiveness
Evaluation: Efficiency
Case Study
Conclusion


Taught by

Association for Computing Machinery (ACM)

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network