Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles (Englisch)
- Neue Suche nach: Dayanikli, Gokcen Yilmaz
- Neue Suche nach: Hatch, Rees R.
- Neue Suche nach: Gerdes, Ryan M.
- Neue Suche nach: Wang, Hongjie
- Neue Suche nach: Zane, Regan
- Neue Suche nach: Dayanikli, Gokcen Yilmaz
- Neue Suche nach: Hatch, Rees R.
- Neue Suche nach: Gerdes, Ryan M.
- Neue Suche nach: Wang, Hongjie
- Neue Suche nach: Zane, Regan
In:
2020 IEEE Security and Privacy Workshops (SPW)
;
98-103
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles
-
Beteiligte:Dayanikli, Gokcen Yilmaz ( Autor:in ) / Hatch, Rees R. ( Autor:in ) / Gerdes, Ryan M. ( Autor:in ) / Wang, Hongjie ( Autor:in ) / Zane, Regan ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.05.2020
-
Format / Umfang:650891 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Workshop Organizers| 2020
- 1
-
[Copyright notice]| 2020
- 1
-
Proceedings| 2020
- 1
-
Learning from Context: A Multi-View Deep Learning Architecture for Malware DetectionKyadige, Adarsh / Rudd, Ethan M. / Berlin, Konstantin et al. | 2020
- 1
-
Title Page| 2020
- 8
-
Attributing and Detecting Fake Images Generated by Known GANsJoslin, Matthew / Hao, Shuang et al. | 2020
- 15
-
Adversarial Attacks Against LipNet: End-to-End Sentence Level LipreadingJethanandani, Mahir / Tang, Derek et al. | 2020
- 20
-
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer ApproachEbrahimi, Mohammadreza / Samtani, Sagar / Chai, Yidong / Chen, Hsinchun et al. | 2020
- 27
-
RTA3: A Real Time Adversarial Attack on Recurrent Neural NetworksSerrano, Christopher R. / Sylla, Pape / Gao, Sicun / Warren, Michael A. et al. | 2020
- 34
-
Minimum-Norm Adversarial Examples on KNN and KNN based ModelsSitawarin, Chawin / Wagner, David et al. | 2020
- 41
-
Backdooring and Poisoning Neural Networks with Image-Scaling AttacksQuiring, Erwin / Rieck, Konrad et al. | 2020
- 48
-
SentiNet: Detecting Localized Universal Attacks Against Deep Learning SystemsChou, Edward / Tramer, Florian / Pellegrino, Giancarlo et al. | 2020
- 55
-
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-featuresZhang, Zhanyuan / Yuan, Benson / McCoyd, Michael / Wagner, David et al. | 2020
- 62
-
On the Robustness of Cooperative Multi-Agent Reinforcement LearningLin, Jieyu / Dzeparoska, Kristina / Zhang, Sai Qian / Leon-Garcia, Alberto / Papernot, Nicolas et al. | 2020
- 69
-
Adversarial Machine Learning-Industry PerspectivesSiva Kumar, Ram Shankar / Nystrom, Magnus / Lambert, John / Marshall, Andrew / Goertzel, Mario / Comissoneru, Andi / Swann, Matt / Xia, Sharon et al. | 2020
- 76
-
A Case Study of the Security Vetting Process of Smart-home Assistant ApplicationsHu, Hang / Yang, Limin / Lin, Shihan / Wang, Gang et al. | 2020
- 82
-
Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio SignalsHylamia, Sam / Yan, Wenqing / Teixeira, Andre / Asan, Noor Badariah / Perez, Mauricio / Augustine, Robin / Voigt, Thiemo et al. | 2020
- 88
-
On the Feasibility of Acoustic Attacks Using Commodity Smart DevicesWixey, Matt / De Cristofaro, Emiliano / Johnson, Shane D et al. | 2020
- 98
-
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric VehiclesDayanikli, Gokcen Yilmaz / Hatch, Rees R. / Gerdes, Ryan M. / Wang, Hongjie / Zane, Regan et al. | 2020
- 104
-
Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT DevicesJanes, Blake / Crawford, Heather / OConnor, TJ et al. | 2020
- 110
-
On Using Camera-based Visible Light Communication for Security ProtocolsChu, Wen-Yi / Yu, Ting-Guang / Lin, Yu-Kai / Lee, Shao-Chuan / Hsiao, Hsu-Chun et al. | 2020
- 118
-
Security Analysis of Networked 3D PrintersMcCormack, Matthew / Chandrasekaran, Sanjay / Liu, Guyue / Yu, Tianlong / DeVincent Wolf, Sandra / Sekar, Vyas et al. | 2020
- 126
-
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware ArchitecturesCheng, Shin-Ming / Ban, Tao / Huang, Jr-Wei / Hong, Bing-Kai / Inoue, Daisuke et al. | 2020
- 127
-
Poster: Radiometric Signatures for Wireless Device Identification over Dynamic ChannelsYan, Wenqing / Voigt, Thiemo / Rohner, Christian et al. | 2020
- 128
-
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply ChainsSobb, Theresa May / Turnbull, Benjamin et al. | 2020
- 136
-
Toward a Trustable, Self-Hosting Computer SystemSomlo, Gabriel L. et al. | 2020
- 144
-
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain JungleKolias, Constantinos / Barbara, Daniel / Rieger, Craig / Ulrich, Jacob et al. | 2020
- 152
-
Binary Analysis with Architecture and Code Section Detection using Supervised Machine LearningBeckman, Bryan / Haile, Jed et al. | 2020
- 157
-
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine LearningHaile, Jedediah / Havens, Sage et al. | 2020
- 163
-
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric UncertaintiesKieras, Timothy / Farooq, Muhammad Junaid / Zhu, Quanyan et al. | 2020
- 171
-
On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAMMeadows, Brett / Edwards, Nathan / Chang, Sang-Yoon et al. | 2020
- 181
-
Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot SoftwareLyons, D. / Zahra, S. et al. | 2020
- 185
-
Partially Observable Games for Secure Autonomy*Ahmadi, Mohamadreza / Viswanathan, Arun A. / Ingham, Michel D. / Tan, Kymie / Ames, Aaron D. et al. | 2020
- 189
-
Case Study: Safety Verification of an Unmanned Underwater VehicleLopez, Diego Manzanas / Musau, Patrick / Hamilton, Nathaniel / Tran, Hoang-Dung / Jonhson, Taylor T. et al. | 2020
- 196
-
Automated Decision Systems for Cybersecurity and Infrastructure SecurityChamberlain, Luanne Burns / Davis, Lauren Eisenberg / Stanley, Martin / Gattoni, Brian R. et al. | 2020
- 202
-
A Non-Cooperative Game based Model for the Cybersecurity of Autonomous SystemsJahan, Farha / Sun, Weiqing / Niyaz, Quamar et al. | 2020
- 208
-
Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for RegressionCai, Feiyang / Li, Jiani / Koutsoukos, Xenofon et al. | 2020
- 215
-
A Smart City Internet for Autonomous SystemsFalco, Gregory et al. | 2020
- 221
-
Fooling A Deep-Learning Based Gait Behavioral Biometric SystemGuo, Honghao / Wang, Zuo / Wang, Benfang / Li, Xiangyang / Shila, Devu M et al. | 2020
- 228
-
Trusted Confidence Bounds for Learning Enabled Cyber-Physical SystemsBoursinos, Dimitrios / Koutsoukos, Xenofon et al. | 2020
- 234
-
A Framework for the Analysis of Deep Neural Networks in Autonomous Aerospace Applications using Bayesian StatisticsHe, Yuning / Schumann, Johann et al. | 2020
- 240
-
Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous VehiclesSharma, Prinkle / Siddanagaiah, Umesh / Kul, Gokhan et al. | 2020
- 244
-
Mission Assurance for Autonomous Undersea VehiclesSiil, Karl / Rubin, Aviel / Elder, Matthew / Dahbura, Anton / Green, Matthew / Watkins, Lanier et al. | 2020
- 250
-
Out-of-Distribution Detection in Multi-Label Datasets using Latent Space of β-VAESundar, Vijaya Kumar / Ramakrishna, Shreyas / Rahiminasab, Zahra / Easwaran, Arvind / Dubey, Abhishek et al. | 2020
- 256
-
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the EdgeChavis, Jeffrey S. / Buczak, Anna / Kunz, Aaron / Rubin, Aviel / Watkins, Lanier et al. | 2020
- 262
-
A Privacy Filter Framework for Internet of Robotic Things ApplicationsAlsulaimawi, Zahir et al. | 2020
- 268
-
Language-agnostic Injection DetectionHermerschmidt, Lars / Straub, Andreas / Piskachev, Goran et al. | 2020
- 276
-
Toward Automated Grammar Extraction via Semantic Labeling of Parser ImplementationsHarmon, Carson / Larsen, Bradford / Sultanik, Evan A. et al. | 2020
- 284
-
The Geometry of Syntax and Semantics for Directed File TransformationsHuntsman, Steve / Robinson, Michael et al. | 2020
- 291
-
Armor Within: Defending Against Vulnerabilities in Third-Party LibrariesAli, Sameed / Anantharaman, Prashant / Smith, Sean W. et al. | 2020
- 300
-
Research Report: The Parsley Data Format Definition LanguageMundkur, Prashanth / Briesemeister, Linda / Shankar, Natarajan / Anantharaman, Prashant / Ali, Sameed / Lucas, Zephyr / Smith, Sean et al. | 2020
- 308
-
Research Report: Formally-Verified ASN.1 Protocol C-language StackPona, Nika / Zaliva, Vadim et al. | 2020
- 318
-
Research Report: Building a Wide Reach Corpus for Secure Parser DevelopmentAllison, Tim / Burke, Wayne / Constantinou, Valentino / Goh, Edwin / Mattmann, Chris / Mensikova, Anastasija / Southam, Philip / Stonebraker, Ryan / Timmaraju, Virisha et al. | 2020
- 327
-
Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and WaxCowger, Sam / Lee, Yerim / Schimanski, Nichole / Tullsen, Mark / Woods, Walter / Jones, Richard / Davis, EW / Harris, William / Brunson, Trent / Harmon, Carson et al. | 2020
- 335
-
Author Index| 2020
- v
-
Table of Contents| 2020
- xi
-
Message from the General Chair| 2020
- xvii
-
Deep Learning and Security Workshop (DLS 2020)| 2020
- xviii
-
Organization| 2020
- xx
-
Workshop on the Internet of Safe Things (SafeThings 2020)| 2020
- xxi
-
SafeThings 2020 Organization| 2020
- xxiii
-
Cyber Resilient Supply Chain Technologies Workshop (CReSCT 2020)| 2020
- xxiv
-
Program Committee| 2020
- xxv
-
Workshop on Assured Autonomous Systems 2020| 2020
- xxvi
-
WAAS 2020 Organization| 2020
- xxviii
-
The Sixth IEEE Workshop on Language-Theoretic Security (LangSec 2020)| 2020
- xxx
-
LangSec 2020 Organization| 2020