Results 31 to 40 of about 22,160 (195)
On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions [PDF]
Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well.
Shah Zahid Khan +2 more
doaj +2 more sources
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core +1 more source
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E. +4 more
core +1 more source
PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors
Spoofing a passive Hall sensor with fake magnetic fields can inject false data into the downstream of connected systems. Several works have tried to provide a defense against the intentional spoofing to different sensors over the last six years. However,
Anomadarshi Barua +1 more
doaj +3 more sources
Practical Attacks on Voice Spoofing Countermeasures
Voice authentication has become an integral part in security-critical operations, such as bank transactions and call center conversations. The vulnerability of automatic speaker verification systems (ASVs) to spoofing attacks instigated the development of countermeasures (CMs), whose task is to tell apart bonafide and spoofed speech. Together, ASVs and
Andre Kassis, Urs Hengartner
openaire +2 more sources
An autonomous GNSS anti-spoofing technique [PDF]
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems +2 more
core +1 more source
Pilot Spoofing Attack by Multiple Eavesdroppers
Accepted by IEEE Transaction on Wireless ...
Ke-Wen Huang +3 more
openaire +2 more sources
Spoofing Attacks Against Vehicular FMCW Radar [PDF]
The safety and security of the passengers in vehicles in the face of cyber attacks is a key element in the automotive industry, especially with the emergence of the Advanced Driver Assistance Systems (ADAS) and the vast improvement in Autonomous Vehicles (AVs). Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors
Rony Komissarov, Avishai Wool
openaire +2 more sources
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A. +3 more
core +1 more source
Active eavesdropping via spoofing relay attack [PDF]
This paper studies a new active eavesdropping technique via the so-called spoofing relay attack, which could be launched by the eavesdropper to significantly enhance the information leakage rate from the source over conventional passive eaves-dropping.
Yong Zeng 0001, Rui Zhang 0006
openaire +2 more sources

