no code implementations • 3 Jul 2023 • Debopam Sanyal, Jui-Tse Hung, Manav Agrawal, Prahlad Jasti, Shahab Nikkhoo, Somesh Jha, Tianhao Wang, Sibin Mohan, Alexey Tumanov
Second, we counter the proposed attack with a noise-based defense mechanism that thwarts fingerprinting by adding noise to the specified performance metrics.
no code implementations • 18 Jun 2021 • Kanakesh Vatta Kkuni, Sibin Mohan, Guangya Yang, Wilsun Xu
This paper studies the impact of the inner loop on the grid forming converter's ability to behave as a voltage source behind an impedance.
no code implementations • 12 Mar 2020 • Monowar Hasan, Sibin Mohan, Takayuki Shimizu, HongSheng Lu
Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms.
Networking and Internet Architecture Cryptography and Security
1 code implementation • 26 Aug 2019 • Monowar Hasan, Sibin Mohan
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators.
Cryptography and Security Systems and Control Systems and Control
no code implementations • 4 Jun 2018 • Chien-Ying Chen, Monowar Hasan, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries - say, to launch side channel attacks or even destabilize the system by denying access to critical resources.
Cryptography and Security