Zobrazeno 1 - 10
of 40
pro vyhledávání: '"IANNACONE, MICHAEL D."'
Autor:
Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intell
Externí odkaz:
http://arxiv.org/abs/2308.14835
Autor:
Hollifield, Samuel C, Moriano, Pablo, Lambert, William L, Asiamah, Joel, Sikkema, Isaac, Iannacone, Michael D
Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicl
Externí odkaz:
http://arxiv.org/abs/2306.15588
Publikováno v:
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022
Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of different levels of sophistication. Fabrication attacks are the easiest to administer -- an adversary simply sends (extra) frames on a CAN -- but also the easiest to detect
Externí odkaz:
http://arxiv.org/abs/2201.02665
Autor:
Blevins, Deborah H., Moriano, Pablo, Bridges, Robert A., Verma, Miki E., Iannacone, Michael D., Hollifield, Samuel C
Publikováno v:
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021
Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message
Externí odkaz:
http://arxiv.org/abs/2101.05781
Autor:
Verma, Miki E., Bridges, Robert A., Iannacone, Michael D., Hollifield, Samuel C., Moriano, Pablo, Hespeler, Steven C., Kay, Bill, Combs, Frank L.
Publikováno v:
PLoS one 19, no. 1 (2024): e0296879
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicul
Externí odkaz:
http://arxiv.org/abs/2012.14600
Autor:
Bridges, Robert A., Oesch, Sean, Verma, Miki E., Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M.
Publikováno v:
Digital Threats: Research and Practice 2023
In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it wort
Externí odkaz:
http://arxiv.org/abs/2012.09214
Autor:
Verma, Miki E., Bridges, Robert A., Sosnowski, Jordan J., Hollifield, Samuel C., Iannacone, Michael D.
CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their mappings of CAN data to vehicle signals, and these definitions vary according to make,
Externí odkaz:
http://arxiv.org/abs/2006.05993
Metrics and frameworks to quantifiably assess security measures have arisen from needs of three distinct research communities - statistical measures from the intrusion detection and prevention literature, evaluation of cyber exercises, e.g.,red-team
Externí odkaz:
http://arxiv.org/abs/1902.00053
Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, a
Externí odkaz:
http://arxiv.org/abs/1812.02867
Autor:
Glass-Vanderlan, Tarrah R., Iannacone, Michael D., Vincent, Maria S., Qian, Chen, Bridges, Robert A.
This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is organized by the input data source, presenting targeted sub-surveys of
Externí odkaz:
http://arxiv.org/abs/1805.06070