Skip to main content

Showing 1–9 of 9 results for author: Pesé, M D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.04464  [pdf, ps, other

    cs.AI

    Anomalous Decision Discovery using Inverse Reinforcement Learning

    Authors: Ashish Bastola, Mert D. Pesé, Long Cheng, Jonathon Smereka, Abolfazl Razi

    Abstract: Anomaly detection plays a critical role in Autonomous Vehicles (AVs) by identifying unusual behaviors through perception systems that could compromise safety and lead to hazardous situations. Current approaches, which often rely on predefined thresholds or supervised learning paradigms, exhibit reduced efficacy when confronted with unseen scenarios, sensor noise, and occlusions, leading to potenti… ▽ More

    Submitted 6 July, 2025; originally announced July 2025.

  2. arXiv:2506.11472  [pdf, ps, other

    cs.CV cs.LG

    On the Natural Robustness of Vision-Language Models Against Visual Perception Attacks in Autonomous Driving

    Authors: Pedram MohajerAnsari, Amir Salarpour, Michael Kühr, Siyu Huang, Mohammad Hamad, Sebastian Steinhorst, Habeeb Olufowobi, Mert D. Pesé

    Abstract: Autonomous vehicles (AVs) rely on deep neural networks (DNNs) for critical tasks such as traffic sign recognition (TSR), automated lane centering (ALC), and vehicle detection (VD). However, these models are vulnerable to attacks that can cause misclassifications and compromise safety. Traditional defense mechanisms, including adversarial training, often degrade benign accuracy and fail to generali… ▽ More

    Submitted 8 July, 2025; v1 submitted 13 June, 2025; originally announced June 2025.

  3. arXiv:2504.10717  [pdf, other

    cs.CR

    FuzzSense: Towards A Modular Fuzzing Framework for Autonomous Driving Software

    Authors: Andrew Roberts, Lorenz Teply, Mert D. Pese, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst

    Abstract: Fuzz testing to find semantic control vulnerabilities is an essential activity to evaluate the robustness of autonomous driving (AD) software. Whilst there is a preponderance of disparate fuzzing tools that target different parts of the test environment, such as the scenario, sensors, and vehicle dynamics, there is a lack of fuzzing strategies that ensemble these fuzzers to enable concurrent fuzzi… ▽ More

    Submitted 14 April, 2025; originally announced April 2025.

  4. arXiv:2411.10612  [pdf, other

    cs.CR cs.OS

    Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives

    Authors: Marco De Vincenzi, Mert D. Pesé, Chiara Bodei, Ilaria Matteucci, Richard R. Brooks, Monowar Hasan, Andrea Saracino, Mohammad Hamad, Sebastian Steinhorst

    Abstract: The growing reliance on software in vehicles has given rise to the concept of Software-Defined Vehicles (SDVs), fundamentally reshaping the vehicles and the automotive industry. This survey explores the cybersecurity and privacy challenges posed by SDVs, which increasingly integrate features like Over-the-Air (OTA) updates and Vehicle-to-Everything (V2X) communication. While these advancements enh… ▽ More

    Submitted 22 December, 2024; v1 submitted 15 November, 2024; originally announced November 2024.

  5. arXiv:2410.09043  [pdf

    cs.CR cs.AI

    Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI

    Authors: Muhammet Anil Yagiz, Pedram MohajerAnsari, Mert D. Pese, Polat Goktas

    Abstract: In the evolving landscape of autonomous vehicles, ensuring robust in-vehicle network (IVN) security is paramount. This paper introduces an advanced intrusion detection system (IDS) called KD-XVAE that uses a Variational Autoencoder (VAE)-based knowledge distillation approach to enhance both performance and efficiency. Our model significantly reduces complexity, operating with just 1669 parameters… ▽ More

    Submitted 15 October, 2024; v1 submitted 11 October, 2024; originally announced October 2024.

  6. arXiv:2409.18248  [pdf, ps, other

    cs.CR

    Discovering New Shadow Patterns for Black-Box Attacks on Lane Detection of Autonomous Vehicles

    Authors: Pedram MohajerAnsari, Amir Salarpour, Jan de Voor, Alkim Domeke, Arkajyoti Mitra, Grace Johnson, Habeeb Olufowobi, Mohammad Hamad, Mert D. Pese

    Abstract: We present a novel physical-world attack on autonomous vehicle (AV) lane detection systems that leverages negative shadows -- bright, lane-like patterns projected by passively redirecting sunlight through occluders. These patterns exploit intensity-based heuristics in modern lane detection (LD) algorithms, causing AVs to misclassify them as genuine lane markings. Unlike prior attacks, our method i… ▽ More

    Submitted 13 June, 2025; v1 submitted 26 September, 2024; originally announced September 2024.

  7. arXiv:2409.15561  [pdf, other

    cs.CR

    Analyzing Privacy Implications of Data Collection in Android Automotive OS

    Authors: Bulut Gözübüyük, Brian Tang, Kang G. Shin, Mert D. Pesé

    Abstract: Modern vehicles have become sophisticated computation and sensor systems, as evidenced by advanced driver assistance systems, in-car infotainment, and autonomous driving capabilities. They collect and process vast amounts of data through various embedded subsystems. One significant player in this landscape is Android Automotive OS (AAOS), which has been integrated into over 100M vehicles and has b… ▽ More

    Submitted 23 September, 2024; originally announced September 2024.

  8. Achieving the Safety and Security of the End-to-End AV Pipeline

    Authors: Noah T. Curran, Minkyoung Cho, Ryan Feng, Liangkai Liu, Brian Jay Tang, Pedram MohajerAnsari, Alkim Domeke, Mert D. Pesé, Kang G. Shin

    Abstract: In the current landscape of autonomous vehicle (AV) safety and security research, there are multiple isolated problems being tackled by the community at large. Due to the lack of common evaluation criteria, several important research questions are at odds with one another. For instance, while much research has been conducted on physical attacks deceiving AV perception systems, there is often inade… ▽ More

    Submitted 5 September, 2024; originally announced September 2024.

    Comments: Accepted to 1st Cyber Security in Cars Workshop (CSCS) at CCS

  9. arXiv:2409.01234  [pdf, other

    cs.CR

    SoK: Security of the Image Processing Pipeline in Autonomous Vehicles

    Authors: Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari, Mert D. Pesé, Sebastian Steinhorst

    Abstract: Cameras are crucial sensors for autonomous vehicles. They capture images that are essential for many safety-critical tasks, including perception. To process these images, a complex pipeline with multiple layers is used. Security attacks on this pipeline can severely affect passenger safety and system performance. However, many attacks overlook different layers of the pipeline, and their feasibilit… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.