Skip to main content

Showing 1–20 of 20 results for author: Zonouz, S

Searching in archive cs. Search in all archives.
.
  1. One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels

    Authors: Twisha Chattopadhyay, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner, Saman Zonouz, Raheem Beyah

    Abstract: The 3D printing industry is rapidly growing and increasingly adopted across various sectors including manufacturing, healthcare, and defense. However, the operational setup often involves hazardous environments, necessitating remote monitoring through cameras and other sensors, which opens the door to cyber-based attacks. In this paper, we show that an adversary with access to video recordings of… ▽ More

    Submitted 27 June, 2025; originally announced June 2025.

    Comments: 17 pages [Extended Version]

  2. A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners

    Authors: Anna Raymaker, Akshaya Kumar, Miuyin Yong Wong, Ryan Pickren, Animesh Chhotaray, Frank Li, Saman Zonouz, Raheem Beyah

    Abstract: Maritime systems, including ships and ports, are critical components of global infrastructure, essential for transporting over 80% of the world's goods and supporting internet connectivity. However, these systems face growing cybersecurity threats, as shown by recent attacks disrupting Maersk, one of the world's largest shipping companies, causing widespread impacts on international trade. The uni… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: 18 pages, 2 figures, To appear in the Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS '25)

  3. arXiv:2503.23718  [pdf, other

    cs.SE cs.CR

    Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis

    Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji

    Abstract: Smart contracts are fundamental pillars of the blockchain, playing a crucial role in facilitating various business transactions. However, these smart contracts are vulnerable to exploitable bugs that can lead to substantial monetary losses. A recent study reveals that over 80% of these exploitable bugs, which are primarily functional bugs, can evade the detection of current tools. The primary issu… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

  4. arXiv:2410.11131  [pdf, other

    cs.CR

    Sensor Deprivation Attacks for Stealthy UAV Manipulation

    Authors: Alessandro Erba, John H. Castellanos, Sahil Sihag, Saman Zonouz, Nils Ole Tippenhauer

    Abstract: Unmanned Aerial Vehicles autonomously perform tasks with the use of state-of-the-art control algorithms. These control algorithms rely on the freshness and correctness of sensor readings. Incorrect control actions lead to catastrophic destabilization of the process. In this work, we propose a multi-part \emph{Sensor Deprivation Attacks} (SDAs), aiming to stealthily impact process control via sen… ▽ More

    Submitted 14 October, 2024; originally announced October 2024.

  5. arXiv:2311.18539  [pdf, other

    cs.CR eess.SY

    Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process Attacks

    Authors: Moses Ike, Kandy Phan, Anwesh Badapanda, Matthew Landen, Keaton Sadoski, Wanda Guo, Asfahan Shah, Saman Zonouz, Wenke Lee

    Abstract: Modern industrial control systems (ICS) attacks infect supervisory control and data acquisition (SCADA) hosts to stealthily alter industrial processes, causing damage. To detect attacks with low false alarms, recent work detects attacks in both SCADA and process data. Unfortunately, this led to the same problem - disjointed (false) alerts, due to the semantic and time gap in SCADA and process beha… ▽ More

    Submitted 3 December, 2023; v1 submitted 30 November, 2023; originally announced November 2023.

  6. arXiv:2307.13131  [pdf, other

    cs.CR cs.AI

    Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

    Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia

    Abstract: Camera-based autonomous systems that emulate human perception are increasingly being integrated into safety-critical platforms. Consequently, an established body of literature has emerged that explores adversarial attacks targeting the underlying machine learning models. Adapting adversarial attacks to the physical world is desirable for the attacker, as this removes the need to compromise digital… ▽ More

    Submitted 27 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: 15 pages, 11 figures

  7. arXiv:2212.01957  [pdf, other

    cs.CV

    CSTAR: Towards Compact and STructured Deep Neural Networks with Adversarial Robustness

    Authors: Huy Phan, Miao Yin, Yang Sui, Bo Yuan, Saman Zonouz

    Abstract: Model compression and model defense for deep neural networks (DNNs) have been extensively and individually studied. Considering the co-importance of model compactness and robustness in practical applications, several prior works have explored to improve the adversarial robustness of the sparse neural networks. However, the structured sparse models obtained by the exiting works suffer severe perfor… ▽ More

    Submitted 17 February, 2023; v1 submitted 4 December, 2022; originally announced December 2022.

    Comments: AAAI-23

  8. arXiv:2210.07531  [pdf, other

    cs.CR

    Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices

    Authors: Matthew Chan, Nathaniel Snyder, Marcus Lucas, Luis Garcia, Oleg Sokolsky, James Weimer, Insup Lee, Paulo Tabuada, Saman Zonouz, Mani Srivastava

    Abstract: Although organizations are continuously making concerted efforts to harden their systems against network attacks by air-gapping critical systems, attackers continuously adapt and uncover covert channels to exfiltrate data from air-gapped systems. For instance, attackers have demonstrated the feasibility of exfiltrating data from a computer sitting in a Faraday cage by exfiltrating data using magne… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  9. arXiv:2208.11287  [pdf, other

    cs.RO cs.LG

    Robot Motion Planning as Video Prediction: A Spatio-Temporal Neural Network-based Motion Planner

    Authors: Xiao Zang, Miao Yin, Lingyi Huang, Jingjin Yu, Saman Zonouz, Bo Yuan

    Abstract: Neural network (NN)-based methods have emerged as an attractive approach for robot motion planning due to strong learning capabilities of NN models and their inherently high parallelism. Despite the current development in this direction, the efficient capture and processing of important sequential and spatial information, in a direct and simultaneous way, is still relatively under-explored. To ove… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted in IROS 2022

  10. arXiv:2110.13981  [pdf, other

    cs.CV cs.AI cs.LG

    CHIP: CHannel Independence-based Pruning for Compact Neural Networks

    Authors: Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan

    Abstract: Filter pruning has been widely used for neural network compression because of its enabled practical acceleration. To date, most of the existing filter pruning works explore the importance of filters via using intra-channel information. In this paper, starting from an inter-channel perspective, we propose to perform efficient filter pruning using Channel Independence, a metric that measures the cor… ▽ More

    Submitted 3 April, 2022; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Accepted by NeurIPS 2021. Model Compression, Channel Pruning, Filter Pruning, Deep Learning

  11. arXiv:2102.11455  [pdf, other

    cs.CR eess.SY

    Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed

    Authors: Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana Goulart, Katherine Davis, Saman Zonouz

    Abstract: Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power s… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

    Journal ref: IET Cyber-Physical Systems: Theory & Applications 2021

  12. Multi-Source Data Fusion for Cyberattack Detection in Power Systems

    Authors: Abhijeet Sahu, Zeyu Mao, Patrick Wlazlo, Hao Huang, Katherine Davis, Ana Goulart, Saman Zonouz

    Abstract: Cyberattacks can cause a severe impact on power systems unless detected early. However, accurate and timely detection in critical infrastructure systems presents challenges, e.g., due to zero-day vulnerability exploitations and the cyber-physical nature of the system coupled with the need for high reliability and resilience of the physical system. Conventional rule-based and anomaly-based intrusio… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Journal ref: IEEE Access 2021

  13. arXiv:2005.00336  [pdf, other

    eess.SP cs.CV cs.LG cs.RO

    On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification

    Authors: Vidyasagar Sadhu, Saman Zonouz, Dario Pompili

    Abstract: With the increase in use of Unmanned Aerial Vehicles (UAVs)/drones, it is important to detect and identify causes of failure in real time for proper recovery from a potential crash-like scenario or post incident forensics analysis. The cause of crash could be either a fault in the sensor/actuator system, a physical damage/attack, or a cyber attack on the drone's software. In this paper, we propose… ▽ More

    Submitted 6 May, 2020; v1 submitted 3 April, 2020; originally announced May 2020.

    Comments: IEEE International Conference on Robotics and Automation (ICRA), May 2020, 6+1 pages

  14. arXiv:1909.04213  [pdf

    cs.CR

    Selfie: User-defined Sensitive Memory Protection and Recovery

    Authors: Pengfei Sun, Saman Zonouz

    Abstract: Different users always have different requirement for sensitive memory definition. It is not flexible for aborting program execution once detecting memory corruption. Because the users may loose some sensitive data. We presented Selfie, a hybrid solution to provide one flexible solution to protect the sensitive memory according to users' requirements in runtime. Finally, Selfie can provide one sol… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

    Comments: 9 pages, 3 figures

  15. arXiv:1907.00332  [pdf, other

    cs.CR cs.CY cs.HC

    Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness

    Authors: Gabriel Salles-Loustau, Vidyasagar Sadhu, Dario Pompili, Saman Zonouz, Vincent Sritapan

    Abstract: Trustworthy operation of our national critical infrastructures, such as the electricity grid, against adversarial parties and accidental failures requires constant and secure monitoring capabilities. In this paper, Eyephone is presented to leverage secure smartphone sensing and data acquisition capabilities and enable pervasive sensing of the national critical infrastructures. The reported informa… ▽ More

    Submitted 30 June, 2019; originally announced July 2019.

    Comments: 6 pages, IEEE HST 2016

    Journal ref: 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, pp. 1-6

  16. arXiv:1906.03037  [pdf, other

    cs.CY cs.AI cs.LG cs.MA

    Argus: Smartphone-enabled Human Cooperation via Multi-Agent Reinforcement Learning for Disaster Situational Awareness

    Authors: Vidyasagar Sadhu, Gabriel Salles-Loustau, Dario Pompili, Saman Zonouz, Vincent Sritapan

    Abstract: Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations. The agents can be both human bystanders at the disaster scene as well as drones or robots that can assist the humans. The agents are involved in capturing the images of the scene using their smartphones… ▽ More

    Submitted 28 April, 2019; originally announced June 2019.

    Journal ref: 2016 IEEE International Conference on Autonomic Computing (ICAC), Wurzburg, 2016, pp. 251-256

  17. arXiv:1904.09631  [pdf, other

    cs.LG stat.ML

    HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering

    Authors: Vidyasagar Sadhu, Saman Zonouz, Vincent Sritapan, Dario Pompili

    Abstract: Mobile context determination is an important step for many context aware services such as location-based services, enterprise policy enforcement, building or room occupancy detection for power or HVAC operation, etc. Especially in enterprise scenarios where policies (e.g., attending a confidential meeting only when the user is in "Location X") are defined based on mobile context, it is paramount t… ▽ More

    Submitted 28 April, 2019; v1 submitted 21 April, 2019; originally announced April 2019.

    Comments: Mobile context, collaborative filtering, privacy-preserving, personalized model, sensors, location, prediction, hidden markov models, google now, apple siri, cortana, alexa

    ACM Class: I.2.11

    Journal ref: IEEE International Conference on Pervasive Computing and Communications (PerCom), Kyoto, Japan, 2019, pp. 1-9

  18. arXiv:1812.08310  [pdf, other

    cs.CR

    Control Behavior Integrity for Distributed Cyber-Physical Systems

    Authors: Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman Zonouz

    Abstract: Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave as intended. Cyberattacks, however, are not new and decades of security research have developed plenty of solutions to thwart them. Unfo… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 15 pages, 8 figures

  19. CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion

    Authors: Vidyasagar Sadhu, Dario Pompili, Saman Zonouz, Vincent Sritapan

    Abstract: Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security policies, for supporting indoor room navigation, and for providing personalized assistance. However, a major problem still remains unaddressed---the lack of solutions that work across b… ▽ More

    Submitted 29 September, 2017; originally announced October 2017.

    Comments: 9 pages, 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada, 2017, pp. 1-9

  20. Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations

    Authors: Yi Han, Sriharsha Etigowni, Hua Li, Saman Zonouz, Athina Petropulu

    Abstract: Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded programmable logic controllers (PLCs). The controllers monitor and control the critical infrastructures, such as electric power grids and healthcare platforms, and continuously report back the system status to human operators. We present Zeus, a contactless embedded controller securit… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Journal ref: CCS '17, October 30-November 3, 2017, Dallas, TX, USA