Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
ERACAN: Defending Against an Emerging CAN Threat Model
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1894–1908https://doi.org/10.1145/3658644.3690267The Controller Area Network (CAN) is a pivotal communication protocol extensively utilized in vehicles, aircraft, factories, and diverse cyber-physical systems (CPSs). The extensive CAN security literature resulting from decades of wide usage may create ...
- research-articleJanuary 2025
SAIN: improving ICS attack detection sensitivity via state-aware invariants
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 369, Pages 6597–6613Industrial Control Systems (ICSs) rely on Programmable Logic Controllers (PLCs) to operate within a set of states. The states are composed of variables that determine how sensor data is interpreted, configuration parameters are applied, and actuator ...
- research-articleJanuary 2025
Finding traceability attacks in the bluetooth low energy specification and its implementations
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 252, Pages 4499–4516Bluetooth Low Energy (BLE) provides an efficient and convenient means for connecting a wide range of devices and peripherals. While its designers attempted to make tracking devices difficult through the use of MAC address randomization, a comprehensive ...
- short-paperJuly 2024
Integrating ML/AI workflows in a Streaming Data Management and Processing Platform for Building Energy Research
PEARC '24: Practice and Experience in Advanced Research Computing 2024: Human Powered ComputingArticle No.: 54, Pages 1–5https://doi.org/10.1145/3626203.3670599Aimed at reducing energy consumption and improving efficiency and sustainability, the state-of-the-art research on building energy prediction and optimization is increasingly driven by advanced ML/AI technologies using large volumes of Internet of Things ...
- discussionJune 2024
Role of Resilience in Cyber-Physical Systems: A Roundtable Panel
- Saurabh Bagchi,
- Mahsa Ghasemi,
- Kang G. Shin,
- Nalini Venkatasubramanian,
- Dongyan Xu,
- Saman Zonouz,
- Dimitrios Serpanos
The panel was held on 14 November 2023 at Purdue University as part of a Grand Challenges in Resilience Workshop sponsored by the U.S. National Science Foundation and organized by our center, the Center for Resilient Infrastructures, Systems, and ...
-
- research-articleAugust 2023
ZBCAN: a zero-byte CAN defense system
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 386, Pages 6893–6910Controller Area Network (CAN) is a widely used network protocol. In addition to being the main communication medium for vehicles, it is also used in factories, medical equipment, elevators, and avionics. Unfortunately, CAN was designed without any ...
- research-articleAugust 2023
PatchVerif: discovering faulty patches in robotic vehicles
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 169, Pages 3011–3028Modern software is continuously patched to fix bugs and security vulnerabilities. Patching is particularly important in robotic vehicles (RVs), in which safety and security bugs can cause severe physical damages. However, existing automated methods ...
- research-articleNovember 2022
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing
- Howard D. Grimes,
- Gabriela F. Ciocarlie,
- Bo Yu,
- Duminda Wijesekera,
- Greg Shannon,
- Wayne Austad,
- Charles Fracchia,
- Dongyan Xu,
- Thomas R. Kurfess,
- Lisa Strama,
- Michael Mylrea,
- Bill Reid
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 20, Issue 6Pages 53–65https://doi.org/10.1109/MSEC.2022.3160465Biopharmaceutical production systems and processes are vulnerable to cyberattacks from sophisticated adversaries. Therefore, it is imperative to start building biopharmaceutical manufacturing systems that offer verifiable formalism and transform the ...
- research-articleJune 2022
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch
- Taegyu Kim,
- Aolin Ding,
- Sriharsha Etigowni,
- Pengfei Sun,
- Jizhou Chen,
- Luis Garcia,
- Saman Zonouz,
- Dongyan Xu,
- Dave (Jing) Tian
MobiSys '22: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and ServicesPages 69–83https://doi.org/10.1145/3498361.3538938Unmanned Aerial Vehicles as a service (UAVaaS) has increased the field deployment of Robotic Aerial Vehicles (RAVs) for different services such as transportation and terrain exploration. These RAVs are controlled by firmware, which is often closed-...
- research-articleMay 2022
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
- Sungwoo Kim,
- Gisu Yeo,
- Taegyu Kim,
- Junghwan "John" Rhee,
- Yuseok Jeon,
- Antonio Bianchi,
- Dongyan Xu,
- Dave (Jing) Tian
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 534–545https://doi.org/10.1145/3488932.3523263Controller Area Network (CAN) is the de-facto standard in-vehicle network system. Despite its wide adoption by automobile manufacturers, the lack of security design makes it vulnerable to attacks. For instance, broadcasting packets without ...
- research-articleFebruary 2021
Dynamic Pricing Strategy for Logistics Revenue Management using Data Mining Technology
- Dongyan Xu,
- Shiji Qiao,
- Xiaoyu Yang,
- Dongjie Zhang,
- Zhongwei Yao,
- Xiaohan Du,
- Yi Shi,
- Yin Wang,
- Zhenzhen Zhang,
- Jun Lu,
- Jian Jin,
- Huan Chen,
- Xiaolong Yao
ISCSIC 2020: Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent ControlArticle No.: 7, Pages 1–7https://doi.org/10.1145/3440084.3441183In this article, we proposed a new dynamic pricing strategy for revenue management in express industry. By analysing the historical data using big data analysis methods, we found out that a volume-price model, which involves the demand-price sensitivity ...
- research-articleNovember 2020
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 263–278https://doi.org/10.1145/3372297.3417249We propose a new type of vulnerability for Robotic Vehicles (RVs), called Cyber-Physical Inconsistency. These vulnerabilities target safety checks in RVs (e.g., crash detection). They can be exploited by setting up malicious environment conditions such ...
- research-articleAugust 2020
From control model to program: investigating robotic aerial vehicle accidents with MAYDAY
- Taegyu Kim,
- Chung Hwan Kim,
- Altay Ozen,
- Fan Fei,
- Zhan Tu,
- Xiangyu Zhang,
- Xinyan Deng,
- Dave (Jing) Tian,
- Dongyan Xu
SEC'20: Proceedings of the 29th USENIX Conference on Security SymposiumArticle No.: 52, Pages 913–930With wide adoption of robotic aerial vehicles (RAVs), their accidents increasingly occur, calling for in-depth investigation of such accidents. Unfortunately, an inquiry to "why did my drone crash" often ends up with nowhere, if the root cause lies in the ...
- research-articleAugust 2020
BLESA: spoofing attacks against reconnections in bluetooth low energy
WOOT'20: Proceedings of the 14th USENIX Conference on Offensive TechnologiesArticle No.: 8, Page 8The Bluetooth Low Energy (BLE) protocol ubiquitously enables energy-efficient wireless communication among resource-constrained devices. To ease its adoption, BLE requires limited or no user interaction to establish a connection between two devices. ...
- research-articleJuly 2020
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 17, Issue 4Pages 883–897https://doi.org/10.1109/TDSC.2018.2817545Cloud application marketplaces of modern cloud infrastructures offer a new software deployment model, integrated with the cloud environment in its configuration and policies. However, similar to traditional software distribution which has been suffering ...
- research-articleNovember 2019
Flight Recovery of MAVs with Compromised IMU
2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)Pages 3638–3644https://doi.org/10.1109/IROS40897.2019.8968145Micro Aerial Vehicles (MAVs) rely on onboard attitude and position sensors for autonomous flight. Due to their size, weight, and power (SWaP) constraints, most modern MAVs use miniaturized inertial measurement units (IMUs) to provide attitude feedback, ...
- ArticleAugust 2019
RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing
- Taegyu Kim,
- Chung Hwan Kim,
- Junghwan Rhee,
- Fan Fei,
- Zhan Tu,
- Gregory Walkup,
- Xiangyu Zhang,
- Xinyan Deng,
- Dongyan Xu
Robotic vehicles (RVs) are being adopted in a variety of application domains. Despite their increasing deployment, many security issues with RVs have emerged, limiting their wider deployment. In this paper, we address a new type of vulnerability in RV ...
- research-articleDecember 2018
Lprov: Practical Library-aware Provenance Tracing
ACSAC '18: Proceedings of the 34th Annual Computer Security Applications ConferencePages 605–617https://doi.org/10.1145/3274694.3274751With the continuing evolution of sophisticated APT attacks, provenance tracking is becoming an important technique for efficient attack investigation in enterprise networks. Most of existing provenance techniques are operating on system event auditing ...
- research-articleOctober 2018
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 801–816https://doi.org/10.1145/3243734.3243752Robotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical systems that operate in the physical world under the control of computing components in the cyber world. Despite RVs' robustness against natural disturbances, cyber ...
- research-articleAugust 2018
Gemini: Guest-transparent honey files via hypervisor-level access redirection
Computers and Security (CSEC), Volume 77, Issue CPages 737–744https://doi.org/10.1016/j.cose.2018.02.014Highlights- Gemini supports file access redirection within virtual machines to provide sensitive file protection.
Data safety has become a critical problem in the face of various cyber-attacks aiming at stealing or divulging sensitive information. In the event that adversaries have gained access to a system storing classified data, such crucial ...