Skip to main content

Showing 1–4 of 4 results for author: Kann, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.16581  [pdf, ps, other

    cs.IT

    Covert Communication over Physically-Degraded Alarm Two-Way Channels

    Authors: Tuna Erdoğan, Tyler Kann, Aria Nosratinia, Matthieu Bloch

    Abstract: We study covert communications over binary-input discrete memoryless alarm two-way channels, in which two users interact through a two-way channel and attempt to hide the presence of their communication from an eavesdropping receiver. The alarm two-way channel is one in which simultaneous transmissions by both users trigger an alarm at the eavesdropper, which captures the challenges and opportunit… ▽ More

    Submitted 19 June, 2025; originally announced June 2025.

  2. arXiv:2503.17298  [pdf, other

    cs.CR

    UAV Resilience Against Stealthy Attacks

    Authors: Arthur Amorim, Max Taylor, Trevor Kann, Gary T. Leavens, William L. Harrison, Lance Joneckis

    Abstract: Unmanned aerial vehicles (UAVs) depend on untrusted software components to automate dangerous or critical missions, making them a desirable target for attacks. Some work has been done to prevent an attacker who has either compromised a ground control station or parts of a UAV's software from sabotaging the vehicle, but not both. We present an architecture running a UAV software stack with runtime… ▽ More

    Submitted 14 April, 2025; v1 submitted 21 March, 2025; originally announced March 2025.

    Comments: To be featured in ICUAS'25 proceedings

  3. arXiv:2501.18874  [pdf, other

    cs.CR cs.PL

    Enforcing MAVLink Safety & Security Properties Via Refined Multiparty Session Types

    Authors: Arthur Amorim, Max Taylor, Trevor Kann, William L. Harrison, Gary T. Leavens, Lance Joneckis

    Abstract: A compromised system component can issue message sequences that are legal while also leading the overall system into unsafe states. Such stealthy attacks are challenging to characterize, because message interfaces in standard languages specify each individual message separately but do not specify safe sequences of messages. We present initial results from ongoing work applying refined multiparty s… ▽ More

    Submitted 14 March, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: To be featured in proceedings of The 17th NASA Formal Methods Symposium

  4. arXiv:2412.14467  [pdf, other

    cs.CR cs.FL cs.LO cs.PL

    Towards Provable Security in Industrial Control Systems Via Dynamic Protocol Attestation

    Authors: Arthur Amorim, Trevor Kann, Max Taylor, Lance Joneckis

    Abstract: Industrial control systems (ICSs) increasingly rely on digital technologies vulnerable to cyber attacks. Cyber attackers can infiltrate ICSs and execute malicious actions. Individually, each action seems innocuous. But taken together, they cause the system to enter an unsafe state. These attacks have resulted in dramatic consequences such as physical damage, economic loss, and environmental catast… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

    Comments: This paper was accepted into the ICSS'24 workshop