Search Results for author: Sibin Mohan

Found 5 papers, 1 papers with code

Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems

no code implementations3 Jul 2023 Debopam Sanyal, Jui-Tse Hung, Manav Agrawal, Prahlad Jasti, Shahab Nikkhoo, Somesh Jha, Tianhao Wang, Sibin Mohan, Alexey Tumanov

Second, we counter the proposed attack with a noise-based defense mechanism that thwarts fingerprinting by adding noise to the specified performance metrics.

Model extraction

Comparative assessment of typical controlrealizations of grid forming converters based ontheir voltage source behaviour

no code implementations18 Jun 2021 Kanakesh Vatta Kkuni, Sibin Mohan, Guangya Yang, Wilsun Xu

This paper studies the impact of the inner loop on the grid forming converter's ability to behave as a voltage source behind an impedance.

Securing Vehicle-to-Everything (V2X) Communication Platforms

no code implementations12 Mar 2020 Monowar Hasan, Sibin Mohan, Takayuki Shimizu, HongSheng Lu

Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms.

Networking and Internet Architecture Cryptography and Security

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

1 code implementation26 Aug 2019 Monowar Hasan, Sibin Mohan

In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators.

Cryptography and Security Systems and Control Systems and Control

REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation

no code implementations4 Jun 2018 Chien-Ying Chen, Monowar Hasan, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash

The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries - say, to launch side channel attacks or even destabilize the system by denying access to critical resources.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.