{"id":"https://openalex.org/W4297094416","doi":"https://doi.org/10.1109/tifs.2022.3209552","title":"ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles","display_name":"ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4297094416","doi":"https://doi.org/10.1109/tifs.2022.3209552"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3209552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3209552","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100626222","display_name":"Zhen Hong","orcid":"https://orcid.org/0000-0001-9956-3732"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Hong","raw_affiliation_strings":["Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335143","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0002-5343-3921"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081043543","display_name":"Zhenyu Wen","orcid":"https://orcid.org/0000-0002-2914-912X"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Wen","raw_affiliation_strings":["Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040566214","display_name":"Leiqiang Zhou","orcid":"https://orcid.org/0000-0003-1793-7732"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leiqiang Zhou","raw_affiliation_strings":["Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100444111","display_name":"Huan Chen","orcid":"https://orcid.org/0000-0002-3824-6693"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Chen","raw_affiliation_strings":["Faculty of Mechanical Engineering and Automation, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Mechanical Engineering and Automation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100649054","display_name":"Jie Su","orcid":"https://orcid.org/0000-0002-1427-1253"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jie Su","raw_affiliation_strings":["Open Laboratory, School of Computing, Newcastle University, Newcastle Upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"Open Laboratory, School of Computing, Newcastle University, Newcastle Upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100626222"],"corresponding_institution_ids":["https://openalex.org/I55712492"],"apc_list":null,"apc_paid":null,"fwci":0.7364,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.69147211,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"3734","last_page":"3747"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gyroscope","display_name":"Gyroscope","score":0.7571898102760315},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7208163738250732},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6637364029884338},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5584652423858643},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4657263159751892},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4516073167324066},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.3499923348426819},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3315594494342804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3183061480522156},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1829814612865448},{"id":"https://openalex.org/keywords/aerospace-engineering","display_name":"Aerospace engineering","score":0.14636152982711792}],"concepts":[{"id":"https://openalex.org/C158488048","wikidata":"https://www.wikidata.org/wiki/Q483400","display_name":"Gyroscope","level":2,"score":0.7571898102760315},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7208163738250732},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6637364029884338},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5584652423858643},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4657263159751892},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4516073167324066},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.3499923348426819},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3315594494342804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3183061480522156},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1829814612865448},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.14636152982711792},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3209552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3209552","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1703248516","display_name":null,"funder_award_id":"62072408","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6703477702","display_name":null,"funder_award_id":"LY20F020030","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W185142374","https://openalex.org/W1548375161","https://openalex.org/W1966047455","https://openalex.org/W1984610657","https://openalex.org/W1991590832","https://openalex.org/W1998386497","https://openalex.org/W2006137488","https://openalex.org/W2071345726","https://openalex.org/W2074864091","https://openalex.org/W2080562691","https://openalex.org/W2080611336","https://openalex.org/W2094232466","https://openalex.org/W2097108326","https://openalex.org/W2114302432","https://openalex.org/W2116520617","https://openalex.org/W2124886535","https://openalex.org/W2134840571","https://openalex.org/W2207856858","https://openalex.org/W2209610041","https://openalex.org/W2297546602","https://openalex.org/W2320883753","https://openalex.org/W2554346918","https://openalex.org/W2581103495","https://openalex.org/W2586333888","https://openalex.org/W2725499676","https://openalex.org/W2751067567","https://openalex.org/W2762121107","https://openalex.org/W2766764374","https://openalex.org/W2768039447","https://openalex.org/W2785258965","https://openalex.org/W2786355974","https://openalex.org/W2803807991","https://openalex.org/W2807409975","https://openalex.org/W2889144763","https://openalex.org/W2891191277","https://openalex.org/W2894821558","https://openalex.org/W2904454788","https://openalex.org/W2907648442","https://openalex.org/W2911964244","https://openalex.org/W2953695968","https://openalex.org/W2990425245","https://openalex.org/W3016414288","https://openalex.org/W3022787740","https://openalex.org/W3032451801","https://openalex.org/W3084706010","https://openalex.org/W3093777583","https://openalex.org/W4248940585","https://openalex.org/W4399647672","https://openalex.org/W6603557143","https://openalex.org/W6628508383","https://openalex.org/W6628853306","https://openalex.org/W6637642503","https://openalex.org/W6690293760","https://openalex.org/W6719536112","https://openalex.org/W6725091323","https://openalex.org/W6743607113","https://openalex.org/W6784553926","https://openalex.org/W6869608176","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W3017138616","https://openalex.org/W2763821861","https://openalex.org/W2980513516","https://openalex.org/W3196426613","https://openalex.org/W66751078","https://openalex.org/W3013353882","https://openalex.org/W2107920298","https://openalex.org/W2151908614","https://openalex.org/W1921864689","https://openalex.org/W4297094416"],"abstract_inverted_index":{"Electronic":[0],"Stability":[1],"Program":[2],"(ESP)":[3],"is":[4,84],"widely":[5],"used":[6],"in":[7,126],"modern":[8],"vehicles.":[9],"Its":[10],"safety":[11,37],"and":[12,19,32,55,86,109,120,132],"stability":[13],"largely":[14],"depend":[15],"on":[16],"the":[17,22,26,33,40,47,68,76,92,116,121,127],"strength":[18],"reliability":[20],"of":[21,50,115,130],"MEMS":[23],"gyroscope.":[24],"However,":[25],"tight":[27],"coupling":[28],"between":[29],"this":[30,43],"sensor":[31],"environment":[34,129],"brings":[35],"significant":[36],"hazards":[38],"to":[39,52,66,74],"vehicle.":[41],"In":[42],"study,":[44],"we":[45],"describe":[46],"physical":[48],"vulnerability":[49],"gyroscopes":[51],"high-frequency":[53],"acoustics":[54],"introduce":[56],"methods":[57,65],"for":[58],"finding":[59],"resonant":[60],"frequencies.":[61],"We":[62,101],"devised":[63],"two":[64],"inject":[67],"attack":[69,78,83,97],"signal":[70],"into":[71],"audio":[72],"files":[73],"make":[75],"acoustic":[77],"more":[79,99],"stealthy.":[80],"The":[81,113],"realized":[82],"non-intrusive":[85],"does":[87],"not":[88],"require":[89],"tampering":[90],"with":[91],"ESP":[93],"hardware":[94],"device,":[95],"making":[96],"detection":[98],"difficult.":[100],"also":[102],"consider":[103],"a":[104],"neural":[105],"network-based":[106],"defense":[107],"strategy":[108],"verify":[110],"its":[111],"effectiveness.":[112],"construction":[114],"vehicle":[117],"simulation":[118],"system":[119],"above":[122],"experiments":[123],"are":[124],"completed":[125],"co-simulation":[128],"Carsim":[131],"Simulink.":[133]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
