Skip to main content

Showing 1–19 of 19 results for author: Bushnell, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.20466  [pdf, other

    cs.LG cs.AI

    A Method for Fast Autonomy Transfer in Reinforcement Learning

    Authors: Dinuka Sahabandu, Bhaskar Ramasubramanian, Michail Alexiou, J. Sukarno Mertoguno, Linda Bushnell, Radha Poovendran

    Abstract: This paper introduces a novel reinforcement learning (RL) strategy designed to facilitate rapid autonomy transfer by utilizing pre-trained critic value functions from multiple environments. Unlike traditional methods that require extensive retraining or fine-tuning, our approach integrates existing knowledge, enabling an RL agent to adapt swiftly to new settings without requiring extensive computa… ▽ More

    Submitted 29 July, 2024; originally announced July 2024.

  2. arXiv:2009.09511  [pdf, other

    eess.SY cs.CR cs.LG math.OC

    Safety-Critical Online Control with Adversarial Disturbances

    Authors: Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: Paper accepted to the Conference on Decision and Control (CDC), 2020

  3. arXiv:2007.13272  [pdf, other

    eess.SY cs.CR cs.LO math.OC

    Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is m… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted to the IEEE Conference on Decision and Control (CDC), 2020

  4. arXiv:2007.12501  [pdf, other

    eess.SY cs.CR cs.GT cs.LO

    Secure Control in Partially Observable Environments to Satisfy LTL Specifications

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The goal is to generate a defender policy to maximize satisfaction of a given temporal logic speci… ▽ More

    Submitted 4 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: Provisionally accepted to the IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1903.06873

  5. arXiv:2007.12327  [pdf, other

    cs.GT cs.CR

    Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced persistent threats (APTs) are organized prolonged cyberattacks by sophisticated attackers. Although APT activities are stealthy, they interact with the system components and these interactions lead to information flows. Dynamic Information Flow Tracking (DIFT) has been proposed as one of the effective ways to detect APTs using the information flows. However, wide range security analysis u… ▽ More

    Submitted 25 June, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

  6. arXiv:2007.00076  [pdf, other

    math.OC cs.GT

    A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats

    Authors: Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flow Tracking (DIFT) is a promising detection mechanism for detecting APTs. DIFT taints information flows originating at system entities that are suscept… ▽ More

    Submitted 28 June, 2021; v1 submitted 30 June, 2020; originally announced July 2020.

    Comments: 15

  7. arXiv:2006.12327  [pdf, other

    cs.GT

    Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy customized attacks by intelligent adversaries. This paper deals with the detection of APTs that infiltrate cyber systems and compromise specifically targeted data and/or infrastructures. Dynamic information flow tracking is an information trace-based detection mechanism against APTs that taints suspicious information flows in the system and generates… ▽ More

    Submitted 25 June, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

  8. arXiv:2001.06781  [pdf, other

    cs.AI

    FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback

    Authors: Baicen Xiao, Qifan Lu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Reinforcement learning has been successful in training autonomous agents to accomplish goals in complex environments. Although this has been adapted to multiple settings, including robotics and computer games, human players often find it easier to obtain higher rewards in some environments than reinforcement learning algorithms. This is especially true of high-dimensional state spaces where the re… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: Accepted as Full Paper to International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) 2020

  9. arXiv:1912.04735  [pdf, other

    cs.CR

    Covert Channel-Based Transmitter Authentication in Controller Area Networks

    Authors: Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

    Abstract: In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial vehicle functioning. In this scenario, malicious actors can exploit CAN vulnerabilities, such as the la… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

    Comments: Submitted to TDSC (Transactions on Dependable and Secure Computing). arXiv admin note: text overlap with arXiv:1903.05231

  10. arXiv:1910.12282  [pdf, other

    eess.SY cs.GT cs.LO

    Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the satisfaction of a class of temporal properties for cyber-physical systems (CPSs) over a finite-time horizon in the presence of an adversary, in an environment described by discrete-time dynamics. The temporal logic specification is given in safe-LTL_F, a fragment of linear temporal logic over traces of finite length. The interaction of the CPS with the adversary is modeled a… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: Proc. of GameSec2019 (to appear). This version corrects a typo in the simulation, and clarifies some ambiguous material from the Proceedings version

  11. arXiv:1907.10783  [pdf, other

    cs.CR

    Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks

    Authors: Sang Uk Sagong, Radha Poovendran, Linda Bushnell

    Abstract: Data for controlling a vehicle is exchanged among Electronic Control Units (ECUs) via in-vehicle network protocols such as the Controller Area Network (CAN) protocol. Since these protocols are designed for an isolated network, the protocols do not encrypt data nor authenticate messages. Intrusion Detection Systems (IDSs) are developed to secure the CAN protocol by detecting abnormal deviations in… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: 11 pages, 24 figures

    MSC Class: 68W01

  12. arXiv:1907.08823  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Potential-Based Advice for Stochastic Policy Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran

    Abstract: This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward shaping scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE Conference on Decision and Control, 2019

  13. arXiv:1904.09969  [pdf, other

    cs.CR

    Detecting ADS-B Spoofing Attacks using Deep Neural Networks

    Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

    Abstract: The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages the increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management and also improves the safety of billions of current and future passengers. While the benefits of ADS-B are well known, the lack of… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: Accepted to IEEE CNS 2019

  14. arXiv:1903.06873  [pdf, other

    eess.SY cs.CR cs.LO

    Secure Control under Partial Observability with Temporal Logic Constraints

    Authors: Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The search for policies is limited to over the space of finite state controllers, which leads to a… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: To appear at the American Control Conference, 2019

  15. arXiv:1811.05622  [pdf, other

    cs.GT

    A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect APTs. In this paper, we develop a dynamic information flow tracking game for resource-efficient detection of APTs via multi-stage dynamic games. The… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: 16

  16. arXiv:1807.09432  [pdf, other

    cs.CR

    Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

    Authors: Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper presents a new masquerade attack called the cloaking attack and provides formal analyses for clock skew-based Intrusion Detection Systems (IDSs) that detect masquerade attacks in the Controller Area Network (CAN) in automobiles. In the cloaking attack, the adversary manipulates the message inter-transmission times of spoofed messages by adding delays so as to emulate a desired clock ske… ▽ More

    Submitted 23 January, 2019; v1 submitted 25 July, 2018; originally announced July 2018.

    Comments: Part of this work was presented at ACM/IEEE ICCPS 2018; to be published in IEEE Transactions on Information Forensics & Security

  17. arXiv:1710.02692  [pdf, other

    cs.CR

    Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

    Authors: Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols are designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks i… ▽ More

    Submitted 21 March, 2018; v1 submitted 7 October, 2017; originally announced October 2017.

    Comments: 11 pages, 13 figures, This work has been accepted to the 9th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)

    MSC Class: 68W01

  18. arXiv:1603.04374  [pdf, other

    eess.SY cs.CR

    Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach

    Authors: Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Malware propagation poses a growing threat to networked systems such as computer networks and cyber-physical systems. Current approaches to defending against malware propagation are based on patching or filtering susceptible nodes at a fixed rate. When the propagation dynamics are unknown or uncertain, however, the static rate that is chosen may be either insufficient to remove all viruses or too… ▽ More

    Submitted 20 September, 2016; v1 submitted 14 March, 2016; originally announced March 2016.

  19. arXiv:1312.1397  [pdf, other

    eess.SY cs.CR cs.NI

    A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems

    Authors: Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Networked control systems consist of distributed sensors and actuators that communicate via a wireless network. The use of an open wireless medium and unattended deployment leaves these systems vulnerable to intelligent adversaries whose goal is to disrupt the system performance. In this paper, we study the wormhole attack on a networked control system, in which an adversary establishes a link bet… ▽ More

    Submitted 4 December, 2013; originally announced December 2013.

    Comments: 35 pages, 9 figures