Skip to main content

Showing 1–8 of 8 results for author: Gerdes, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.02095  [pdf, other

    cs.LG cs.AR cs.CR eess.SP

    Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

    Authors: Nikhil Muralidhar, Abdullah Zubair, Nathanael Weidler, Ryan Gerdes, Naren Ramakrishnan

    Abstract: The availability of wide-ranging third-party intellectual property (3PIP) cores enables integrated circuit (IC) designers to focus on designing high-level features in ASICs/SoCs. The massive proliferation of ICs brings with it an increased number of bad actors seeking to exploit those circuits for various nefarious reasons. This is not surprising as integrated circuits affect every aspect of socie… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Journal ref: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021, pp. 181-191

  2. Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems

    Authors: Tanmaya Mishra, Thidapat Chantem, Ryan Gerdes

    Abstract: Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are resource-constrained, such as lower processing capabilities, as compared to general purpose computing systems like desktops or servers. However, allowing external interfaces to such embedded systems increases their exposure to attack… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

  3. Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles

    Authors: Gokcen Y. Dayanikli, Rees R. Hatch, Ryan M. Gerdes, Hongjie Wang, Regan Zane

    Abstract: Alleviating range anxiety for electric vehicles (i.e., whether such vehicles can be relied upon to travel long distances in a timely manner) is critical for sustainable transportation. Extremely fast charging (XFC), whereby electric vehicles (EV) can be quickly recharged in the time frame it takes to refuel an internal combustion engine, has been proposed to alleviate this concern. A critical comp… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

    Comments: Accepted by IEEE S&P Workshop on the Internet of Safe Things 2020

  4. arXiv:2006.14679  [pdf, other

    eess.SP cs.CY eess.SY

    On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

    Authors: Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan Gerdes, Z. Berkay Celik

    Abstract: Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and in… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  5. arXiv:2003.04244  [pdf, other

    cs.CR eess.SY

    Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers

    Authors: Pratham Oza, Mahsa Foruhandeh, Ryan Gerdes, Thidapat Chantem

    Abstract: Rapid urbanization calls for smart traffic management solutions that incorporate sensors, distributed traffic controllers and V2X communication technologies to provide fine-grained traffic control to mitigate congestion. As in many other cyber-physical systems, smart traffic management systems typically lack security measures. This allows numerous opportunities for adversarial entities to craft at… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  6. arXiv:2001.07792  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems

    Authors: Yanmao Man, Ming Li, Ryan Gerdes

    Abstract: In vision-based object classification systems imaging sensors perceive the environment and machine learning is then used to detect and classify objects for decision-making purposes; e.g., to maneuver an automated vehicle around an obstacle or to raise an alarm to indicate the presence of an intruder in surveillance settings. In this work we demonstrate how the perception domain can be remotely and… ▽ More

    Submitted 23 June, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Comments: Accepted by USENIX RAID 2020. Source code is available at https://github.com/Harry1993/GhostImage

  7. arXiv:1903.01541  [pdf

    cs.CR

    Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures

    Authors: Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes

    Abstract: In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV) security by incorporating the security vulnerabilities and countermeasures of the Vehicular Ad hoc Networks (VANETs) and their access technologies. Compounding VANETs and modern vehicles will allow adversaries to gain access to the in-vehicle networks and take control of vehicles remotely to use them as a t… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.

  8. arXiv:1804.07381  [pdf

    cs.CR eess.SY

    Vehicle Security: Risk Assessment in Transportation

    Authors: Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes

    Abstract: Intelligent Transportation Systems (ITS) are critical infrastructure that are not immune to both physical and cyber threats. Vehicles are cyber/physical systems which are a core component of ITS, can be either a target or a launching point for an attack on the ITS network. Unknown vehicle security vulnerabilities trigger a race among adversaries to exploit the weaknesses and security experts to mi… ▽ More

    Submitted 7 August, 2018; v1 submitted 19 April, 2018; originally announced April 2018.

    Comments: 9 pages, 1 table, 3 figures