Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Hasan, Monowar"'
Autor:
De Vincenzi, Marco, Pesé, Mert D., Bodei, Chiara, Matteucci, Ilaria, Brooks, Richard R., Hasan, Monowar, Saracino, Andrea, Hamad, Mohammad, Steinhorst, Sebastian
The growing reliance on software in vehicles has given rise to the concept of Software-Defined Vehicles (SDVs), fundamentally reshaping the vehicles and the automotive industry. This survey explores the cybersecurity and privacy challenges posed by S
Externí odkaz:
http://arxiv.org/abs/2411.10612
Large Language Models (LLMs) have demonstrated remarkable language understanding and generation capabilities. However, training, deploying, and accessing these models pose notable challenges, including resource-intensive demands, extended training du
Externí odkaz:
http://arxiv.org/abs/2401.16577
Autor:
Hasan, Monowar, Mohan, Sibin
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation commands that modify their physical behaviors. The limited resources in such systems, coupled with their stringent timing constraints, often prevents the checking of
Externí odkaz:
http://arxiv.org/abs/2304.13956
Autor:
Sarkar, Souvika, Babar, Mohammad Fakhruddin, Hassan, Md Mahadi, Hasan, Monowar, Santu, Shubhra Kanti Karmaker
Publikováno v:
ICPE 2024
This paper presents a performance study of transformer language models under different hardware configurations and accuracy requirements and derives empirical observations about these resource/accuracy trade-offs. In particular, we study how the most
Externí odkaz:
http://arxiv.org/abs/2304.11520
Autor:
Bansal, Ayoosh, Kandikuppa, Anant, Chen, Chien-Ying, Hasan, Monowar, Bates, Adam, Mohan, Sibin
System auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the secu
Externí odkaz:
http://arxiv.org/abs/2208.02699
Autor:
Hasan, Monowar1 (AUTHOR) monowar.hasan@wsu.edu, Kashinath, Ashish2 (AUTHOR) ashishk3@illinois.edu, Chen, Chien-Ying2 (AUTHOR) cchen140@illinois.edu, Mohan, Sibin3 (AUTHOR) sibin.mohan@gwu.edu
Publikováno v:
ACM Computing Surveys. Sep2024, Vol. 56 Issue 9, p1-31. 31p.
Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms. Despite benefits, V2X applications also face great challenges
Externí odkaz:
http://arxiv.org/abs/2003.07191
We propose a design-time framework (named HYDRA-C) for integrating security tasks into partitioned real-time systems (RTS) running on multicore platforms. Our goal is to opportunistically execute security monitoring mechanisms in a 'continuous' manne
Externí odkaz:
http://arxiv.org/abs/1911.11937
Autor:
Hasan, Monowar, Mohan, Sibin
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators. We use a trusted comp
Externí odkaz:
http://arxiv.org/abs/1908.09444
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries - say, to launch side channel attacks or even destabilize the system by denying access to critical resources. We propose a protocol (named REORDER) to obfuscate
Externí odkaz:
http://arxiv.org/abs/1806.01393