Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Miki E Verma"'
Autor:
Miki E Verma, Robert A Bridges, Michael D Iannacone, Samuel C Hollifield, Pablo Moriano, Steven C Hespeler, Bill Kay, Frank L Combs
Publikováno v:
PLoS ONE, Vol 19, Iss 1, p e0296879 (2024)
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions or anomalies on CANs. Prod
Externí odkaz:
https://doaj.org/article/ddd94838251c439ca697993e9312f0e5
Autor:
Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith
Publikováno v:
Digital Threats: Research and Practice.
There is a lack of scientific testing of commercially available malware detectors, especially those that boast accurate classification of never-before-seen (i.e., zero-day) files using machine learning (ML). Consequently, efficacy of malware detector
Autor:
Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone, Miki E. Verma, Robert A. Bridges
Publikováno v:
IEEE Transactions on Vehicular Technology. 70:9685-9700
Controller area networks (CANs) are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their mappings of CAN data to vehicle signals, and these definitio
Publikováno v:
CSET @ USENIX Security Symposium
Whether testing intrusion detection systems, conducting training exercises, or creating data sets to be used by the broader cybersecurity community, realistic user behavior is a critical component of a cyber range. Existing methods either rely on net
Autor:
Derry Tanti Wijaya, Kunlin Cai, Adyasha Maharana, Cynthia Vint, Michael Munsell, Yulin Hswen, Elaine O. Nsoesie, Miki E. Verma, Valentina Staneva, Joseph M. Hellerstein
Publikováno v:
JAMIA Open
Objectives Access to safe and nutritious food is essential for good health. However, food can become unsafe due to contamination with pathogens, chemicals or toxins, or mislabeling of allergens. Illness resulting from the consumption of unsafe foods
Modern vehicles contain scores of Electrical Control Units (ECUs) that broadcast messages over a Controller Area Network (CAN). Vehicle manufacturers rely on security through obscurity by concealing their unique mapping of CAN messages to vehicle fun
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fd74a34f473c69ec866b8aff99eb4124
http://arxiv.org/abs/1811.07897
http://arxiv.org/abs/1811.07897
Autor:
Miki E. Verma, Robert A. Bridges
Publikováno v:
IEEE BigData
Host logs, in particular, Windows Event Logs, are a valuable source of information often collected by security operation centers (SOCs). The semi-structured nature of host logs inhibits automated analytics, and while manual analysis is common, the sh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d3700a12517e67924dec6e8c4d5eb8d6
Autor:
Robert A. Bridges, Michael D. Iannacone, Pablo Moriano, Deborah H. Blevins, Samuel C. Hollifield, Miki E. Verma
Publikováno v:
DOE / OSTI
Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d7e0d537044679c18cd1a69e43fcaca1
https://www.osti.gov/biblio/1765478-time-based-can-intrusion-detection-benchmark
https://www.osti.gov/biblio/1765478-time-based-can-intrusion-detection-benchmark