Anas Alsoliman, Marco Levorato, and Qi Alfred Chen (UC Irvine)

In autonomous vehicle systems – whether ground or aerial – vehicles and infrastructure-level units communicate among each other continually to ensure safe and efficient autonomous operations. However, different attack scenarios might arise in such environments when a device in the network cannot physically pinpoint the actual transmitter of a certain message. For example, a compromised or a malicious vehicle could send a message with a fabricated location to appear as if it is in the location of another legitimate vehicle, or fabricate multiple messages with fake identities to alter the behavior of other vehicles/infrastructure units and cause traffic congestion or accidents. In this paper, we propose a Vision-Based Two-Factor Authentication and Localization Scheme for Autonomous Vehicles. The scheme leverages the vehicles’ light sources and cameras to establish an “Optical Camera Communication (OCC)” channel providing an auxiliary channel between vehicles to visually authenticate and localize the transmitter of messages that are sent over Radio Frequency (RF) channels. Additionally, we identify possible attacks against the proposed scheme as well as mitigation strategies.

View More Papers

LaKSA: A Probabilistic Proof-of-Stake Protocol

Daniel Reijsbergen (Singapore University of Technology and Design), Pawel Szalachowski (Singapore University of Technology and Design), Junming Ke (University of Tartu), Zengpeng Li (Singapore University of Technology and Design), Jianying Zhou (Singapore University of Technology and Design)

Read More

Reining in the Web's Inconsistencies with Site Policy

Stefano Calzavara (Università Ca' Foscari Venezia), Tobias Urban (Institute for Internet Security and Ruhr University Bochum), Dennis Tatang (Ruhr University Bochum), Marius Steffens (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)

Read More

HTTPS-Only: Upgrading all connections to https: in Web Browsers

Christoph Kerschbaumer, Julian Gaibler, Arthur Edelstein (Mozilla Corporation), Thyla van der Merwey (ETH Zurich)

Read More

From Library Portability to Para-rehosting: Natively Executing Microcontroller Software...

Wenqiang Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Department of Computer Science, the University of Georgia, USA; School of Cyber Security, University of Chinese Academy of Sciences; Department of Electrical Engineering and Computer Science, the University of Kansas, USA), Le Guan (Department of Computer Science, the University…

Read More