Navigating the Landscape for Real-time Localisation and Map** for Robotics and Virtual and Augmented Reality
Authors:
Sajad Saeedi,
Bruno Bodin,
Harry Wagstaff,
Andy Nisbet,
Luigi Nardi,
John Mawer,
Nicolas Melot,
Oscar Palomar,
Emanuele Vespa,
Tom Spink,
Cosmin Gorgovan,
Andrew Webb,
James Clarkson,
Erik Tomusk,
Thomas Debrunner,
Kuba Kaszyk,
Pablo Gonzalez-de-Aledo,
Andrey Rodchenko,
Graham Riley,
Christos Kotselidis,
Björn Franke,
Michael F. P. O'Boyle,
Andrew J. Davison,
Paul H. J. Kelly,
Mikel Luján
, et al. (1 additional authors not shown)
Abstract:
Visual understanding of 3D environments in real-time, at low power, is a huge computational challenge. Often referred to as SLAM (Simultaneous Localisation and Map**), it is central to applications spanning domestic and industrial robotics, autonomous vehicles, virtual and augmented reality. This paper describes the results of a major research effort to assemble the algorithms, architectures, to…
▽ More
Visual understanding of 3D environments in real-time, at low power, is a huge computational challenge. Often referred to as SLAM (Simultaneous Localisation and Map**), it is central to applications spanning domestic and industrial robotics, autonomous vehicles, virtual and augmented reality. This paper describes the results of a major research effort to assemble the algorithms, architectures, tools, and systems software needed to enable delivery of SLAM, by supporting applications specialists in selecting and configuring the appropriate algorithm and the appropriate hardware, and compilation pathway, to meet their performance, accuracy, and energy consumption goals. The major contributions we present are (1) tools and methodology for systematic quantitative evaluation of SLAM algorithms, (2) automated, machine-learning-guided exploration of the algorithmic and implementation design space with respect to multiple objectives, (3) end-to-end simulation tools to enable optimisation of heterogeneous, accelerated architectures for the specific algorithmic requirements of the various SLAM algorithmic approaches, and (4) tools for delivering, where appropriate, accelerated, adaptive SLAM solutions in a managed, JIT-compiled, adaptive runtime context.
△ Less
Submitted 20 August, 2018;
originally announced August 2018.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Authors:
Hossein Fereidooni,
Jiska Classen,
Tom Spink,
Paul Patras,
Markus Miettinen,
Ahmad-Reza Sadeghi,
Matthias Hollick,
Mauro Conti
Abstract:
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange f…
▽ More
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange for such private information and evidence of healthy lifestyles. Given the associated monetary value, the authenticity and correctness of the activity data collected becomes imperative. In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader. We reveal an intricate security through obscurity approach implemented by the user activity synchronization protocol running on the devices we analyze. Although non-trivial to interpret, we reverse engineer the message semantics, demonstrate how falsified user activity reports can be injected, and argue that based on our discoveries, such attacks can be performed at scale to obtain financial gains. We further document a hardware attack vector that enables circumvention of the end-to-end protocol encryption present in the latest Fitbit firmware, leading to the spoofing of valid encrypted fitness data. Finally, we give guidelines for avoiding similar vulnerabilities in future system designs.
△ Less
Submitted 28 June, 2017;
originally announced June 2017.