The document discusses attacks on cyber-physical systems and sensor spoofing. It begins with an introduction of the author, Jason Larsen, and his work studying attacks on critical infrastructures. It then discusses past demonstrations of attacks on control systems and the potential to hide attacks in physical sensors. The document explores techniques for spoofing sensor readings, including simulating sensor noise and extracting disturbances from real sensor data. It proposes using triangles to model sensor readings and extract state information. The goal is to insert this spoofing code into sensor firmware while reusing existing code to minimize the attack payload.