Hacking Sensors
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Syllabus
Intro
Sensing & Actuation Actuation and decision-making based on sensor dala
Sensor & Security Many prevention and detection mechanisms For malicious network trattos
Attack Vectors of Sensors
Heart Rate Sensor Spoofing
Target: Medical Infusion Pump
Sensor Saturation o New type of sensor spoofing attack using saturation
Infusion Pump and Drop Sensor
Over and Under Infusion
Experimental Setting
Demo (Over-infusion)
Defense for Sensor Saturation
Drone Controlling
Gyroscope on Drone
Experimental Results Found the resonant frequencies of 7 MEMS gyroscopes Not found for 8 MEMS gyroscopes
Shutting Down Drones
Attack Demo
Remote Drone Attack
Signal Injection using EMI
Cardiac Implantable Devices
Application to medical devices
Standard Lead Design
Example
Conclusion
Taught by
USENIX Enigma Conference
Related Courses
Adventures in Authentication and AuthorizationUSENIX Enigma Conference via YouTube Navigating the Sandbox Buffet
USENIX Enigma Conference via YouTube Meaningful Hardware Privacy for a Smart and Augmented Future
USENIX Enigma Conference via YouTube Working on the Frontlines - Privacy and Security with Vulnerable Populations
USENIX Enigma Conference via YouTube Myths and Lies in InfoSec
USENIX Enigma Conference via YouTube