Skip to main content

Showing 1–19 of 19 results for author: Bobba, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.10327  [pdf, ps, other

    cs.CR

    A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation Strategies

    Authors: Sharad Shrestha, Mohammed Ababneh, Satyajayant Misra, Henry M. Cathey, Jr., Roopa Vishwanathan, Matt Jansen, Jinhong Choi, Rakesh Bobba, Yeongjin Jang

    Abstract: In the last decade, the rapid growth of Unmanned Aircraft Systems (UAS) and Unmanned Aircraft Vehicles (UAV) in communication, defense, and transportation has increased. The application of UAS will continue to increase rapidly. This has led researchers to examine security vulnerabilities in various facets of UAS infrastructure and UAVs, which form a part of the UAS system to reinforce these critic… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

  2. arXiv:2410.03971  [pdf, other

    cs.RO cs.CR

    ROS2-Based Simulation Framework for Cyberphysical Security Analysis of UAVs

    Authors: Unmesh Patil, Akshith Gunasekaran, Rakesh Bobba, Houssam Abbas

    Abstract: We present a new simulator of Uncrewed Aerial Vehicles (UAVs) that is tailored to the needs of testing cyber-physical security attacks and defenses. Recent investigations into UAV safety have unveiled various attack surfaces and some defense mechanisms. However, due to escalating regulations imposed by aviation authorities on security research on real UAVs, and the substantial costs asso… ▽ More

    Submitted 4 October, 2024; originally announced October 2024.

  3. arXiv:2310.19152  [pdf, other

    cs.LG cs.CL cs.CR

    BERT Lost Patience Won't Be Robust to Adversarial Slowdown

    Authors: Zachary Coalson, Gabriel Ritter, Rakesh Bobba, Sanghyun Hong

    Abstract: In this paper, we systematically evaluate the robustness of multi-exit language models against adversarial slowdown. To audit their robustness, we design a slowdown attack that generates natural adversarial text bypassing early-exit points. We use the resulting WAFFLE attack as a vehicle to conduct a comprehensive evaluation of three multi-exit mechanisms with the GLUE benchmark against adversaria… ▽ More

    Submitted 31 October, 2023; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: Accepted to NeurIPS 2023 [Poster]

  4. arXiv:2012.12518  [pdf, ps, other

    cs.CR

    If This Context Then That Concern: Exploring users' concerns with IFTTT applets

    Authors: Mahsa Saeidi, McKenzie Calvert, Audrey W. Au, Anita Sarma, Rakesh B. Bobba

    Abstract: End users are increasingly using trigger-action platforms like, If-This-Then-That (IFTTT) to create applets to connect smart home devices and services. However, there are inherent risks in using such applets -- even non-malicious ones -- as sensitive information may leak through their use in certain contexts (e.g., where the device is located, who can observe the resultant action). This work aims… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

  5. arXiv:2011.09123  [pdf, other

    cs.CV

    Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs

    Authors: Arezoo Rajabi, Rakesh B. Bobba

    Abstract: Despite high accuracy of Convolutional Neural Networks (CNNs), they are vulnerable to adversarial and out-distribution examples. There are many proposed methods that tend to detect or make CNNs robust against these fooling examples. However, most such methods need access to a wide range of fooling examples to retrain the network or to tune detection parameters. Here, we propose a method to detect… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: Accepted on DSN Workshop on Dependable and Secure Machine Learning 2019

    Journal ref: DSN Workshop on Dependable and Secure Machine Learning (DSML 2019)

  6. arXiv:2005.08321  [pdf, other

    cs.LG cs.CR stat.ML

    Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba

    Abstract: We aim at demonstrating the influence of diversity in the ensemble of CNNs on the detection of black-box adversarial instances and hardening the generation of white-box adversarial attacks. To this end, we propose an ensemble of diverse specialized CNNs along with a simple voting mechanism. The diversity in this ensemble creates a gap between the predictive confidences of adversaries and those of… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

    Comments: Published by Springer in the Lecture Notes in Artificial Intelligence

  7. arXiv:2001.06519  [pdf, other

    cs.CR

    On Scheduler Side-Channels in Dynamic-Priority Real-Time Systems

    Authors: Chien-Ying Chen, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba

    Abstract: While the existence of scheduler side-channels has been demonstrated recently for fixed-priority real-time systems (RTS), there have been no similar explorations for dynamic-priority systems. The dynamic nature of such scheduling algorithms, e.g., EDF, poses a significant challenge in this regard. In this paper we demonstrate that side-channels exist in dynamic priority real-time systems. Using th… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

  8. arXiv:1911.11937  [pdf, other

    cs.OS cs.CR

    Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems

    Authors: Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba

    Abstract: We propose a design-time framework (named HYDRA-C) for integrating security tasks into partitioned real-time systems (RTS) running on multicore platforms. Our goal is to opportunistically execute security monitoring mechanisms in a 'continuous' manner -- i.e., as often as possible, across cores, to ensure that security tasks run with as few interruptions as possible. Our framework will allow desig… ▽ More

    Submitted 14 March, 2020; v1 submitted 26 November, 2019; originally announced November 2019.

    Comments: Accepted for publication DATE 2020

  9. arXiv:1910.08650  [pdf, other

    cs.LG cs.CV stat.ML

    Toward Metrics for Differentiating Out-of-Distribution Sets

    Authors: Mahdieh Abbasi, Changjian Shui, Arezoo Rajabi, Christian Gagne, Rakesh Bobba

    Abstract: Vanilla CNNs, as uncalibrated classifiers, suffer from classifying out-of-distribution (OOD) samples nearly as confidently as in-distribution samples. To tackle this challenge, some recent works have demonstrated the gains of leveraging available OOD sets for training end-to-end calibrated CNNs. However, a critical question remains unanswered in these works: how to differentiate OOD sets for selec… ▽ More

    Submitted 19 November, 2020; v1 submitted 18 October, 2019; originally announced October 2019.

    Comments: Workshop on Safety and Robustness in Decision Making, NeurIPS 2019

    Journal ref: ECAI 2020 : 24th European Conference on Artificial Intelligence

  10. arXiv:1903.06889  [pdf, other

    cs.OS

    MultiK: A Framework for Orchestrating Multiple Specialized Kernels

    Authors: Hsuan-Chi Kuo, Akshith Gunasekaran, Yeongjin Jang, Sibin Mohan, Rakesh B. Bobba, David Lie, Jesse Walker

    Abstract: We present, MultiK, a Linux-based framework 1 that reduces the attack surface for operating system kernels by reducing code bloat. MultiK "orchestrates" multiple kernels that are specialized for individual applications in a transparent manner. This framework is flexible to accommodate different kernel code reduction techniques and, most importantly, run the specialized kernels with near-zero addit… ▽ More

    Submitted 16 March, 2019; originally announced March 2019.

  11. arXiv:1808.08282  [pdf, other

    cs.CV cs.AI

    Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagne

    Abstract: Convolutional Neural Networks (CNNs) significantly improve the state-of-the-art for many applications, especially in computer vision. However, CNNs still suffer from a tendency to confidently classify out-distribution samples from unknown classes into pre-defined known classes. Further, they are also vulnerable to adversarial examples. We are relating these two issues through the tendency of CNNs… ▽ More

    Submitted 3 October, 2018; v1 submitted 20 August, 2018; originally announced August 2018.

  12. A Novel Side-Channel in Real-Time Schedulers

    Authors: Chien-Ying Chen, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba, Negar Kiyavash

    Abstract: We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples of such systems can be found in automotive systems, avionic systems, power plants and industrial control systems among others. This side-channel can leak important timing information such as the future arrival times of real-time tasks.This information can then be used to la… ▽ More

    Submitted 9 May, 2019; v1 submitted 5 June, 2018; originally announced June 2018.

    Journal ref: 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Montreal, 2019, pp. 90-102

  13. arXiv:1804.08794  [pdf, other

    cs.CR cs.LG

    Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning

    Authors: Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba

    Abstract: Detection and rejection of adversarial examples in security sensitive and safety-critical systems using deep CNNs is essential. In this paper, we propose an approach to augment CNNs with out-distribution learning in order to reduce misclassification rate by rejecting adversarial examples. We empirically show that our augmented CNNs can either reject or classify correctly most adversarial examples… ▽ More

    Submitted 16 May, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

  14. arXiv:1711.04808  [pdf, other

    cs.CR cs.OS

    A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems

    Authors: Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba

    Abstract: The increased capabilities of modern real-time systems (RTS) expose them to various security threats. Recently, frameworks that integrate security tasks without perturbing the real-time tasks have been proposed, but they only target single core systems. However, modern RTS are migrating towards multicore platforms. This makes the problem of integrating security mechanisms more complex, as designer… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

    Comments: Accepted for publication, 21st DATE (Design, Automation & Test in Europe) conference, 2018

  15. arXiv:1708.09538  [pdf

    cs.CR

    A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds

    Authors: Read Sprabery, Konstantin Evchenko, Abhilash Raj, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell

    Abstract: While there exist many isolation mechanisms that are available to cloud service providers, including virtual machines, containers, etc., the problem of side-channel increases in importance as a remaining security vulnerability, particularly in the presence of shared caches and multicore processors. In this paper we present a hardware-software mechanism that improves the isolation of cloud processe… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

  16. arXiv:1705.02561  [pdf, other

    cs.CR cs.OS

    A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems

    Authors: Chien-Ying Chen, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash, Rakesh B. Bobba, Rodolfo Pellizzoni, Man-Ki Yoon

    Abstract: In real-time embedded systems (RTS), failures due to security breaches can cause serious damage to the system, the environment and/or injury to humans. Therefore, it is very important to understand the potential threats and attacks against these systems. In this paper we present a novel reconnaissance attack that extracts the exact schedule of real-time systems designed using fixed priority schedu… ▽ More

    Submitted 7 May, 2017; originally announced May 2017.

  17. arXiv:1705.00138  [pdf, ps, other

    cs.CR cs.OS

    Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems

    Authors: Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba

    Abstract: Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to unknown security flaws, and threats to RTS are growing in both number and sophistication. However, until recently, cyber-security considerations were an afterthought in the design of such systems. Any security mechanisms integrated into RTS must (a) co-exist with the real- time tasks in the system and (b) operate withou… ▽ More

    Submitted 23 May, 2017; v1 submitted 29 April, 2017; originally announced May 2017.

    Comments: Accepted for publication, 29th Euromicro Conference on Real-Time Systems (ECRTS17)

  18. arXiv:1703.01641  [pdf, other

    cs.NI

    End-to-End Network Delay Guarantees for Real-Time Systems using SDN

    Authors: Rakesh Kumar, Monowar Hasan, Smruti Padhy, Konstantin Evchenko, Lavanya Piramanayagam, Sibin Mohan, Rakesh B. Bobba

    Abstract: We propose a novel framework that reduces the management and integration overheads for real-time network flows by leveraging the capabilities (especially global visibility and management) of software-defined networking (SDN) architectures. Given the specifications of flows that must meet hard real-time requirements, our framework synthesizes paths through the network and associated switch configur… ▽ More

    Submitted 3 May, 2017; v1 submitted 5 March, 2017; originally announced March 2017.

  19. arXiv:1608.07872  [pdf, ps, other

    cs.CR

    Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems

    Authors: Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni

    Abstract: Due to physical isolation as well as use of proprietary hardware and protocols, traditional real-time systems (RTS) were considered to be invulnerable to security breaches and external attacks. However, this assumption is being challenged by recent attacks that highlight the vulnerabilities in such systems. In this paper, we focus on integrating security mechanisms into RTS (especially legacy RTS)… ▽ More

    Submitted 29 August, 2016; v1 submitted 28 August, 2016; originally announced August 2016.

    Comments: Accepted for publication, IEEE RTSS 2016