Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, and Quanyan Zhu In this paper, the authors formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user.
Author: Julia Solomon-Strauss (Julia Solomon-Strauss)
Attack-Aware Cyber Insurance of Interdependent Computer Networks
Rui Zhang, Quanyan Zhu The authors provide an integrative view of the cyber insurance through a bi-level game-theoretic model.
10 Questions: Raj De's career has taken him from 9/11 Commission to White House to NSA
Nearly 20 years ago, a young Harvard Law School student named Raj De sat in his mentor’s office and explained why he’d decided to bypass BigLaw for the Department of Justice. The older lawyer understood completely. “You should always go where the action is,” he counseled. De took this advice—and then some. Leadership roles at...
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation
Jeffrey Pawlick and Quanyan Zhu The authors address the strategic interaction between trackers who collect data and users when incentives to maintain privacy and improve accuracy are misaligned.
A Security Analysis of an In Vehicle Infotainment and App Platform
Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, and Damon McCoy The authors discuss the security implications of the increasing trend in the automotive industry towards integrating trusted third-party apps with In-Vehicle-Infotainment systems (IVI) via smartphones.
Activation of logic encrypted chips: Pre-test or post-test?
Muhammad Yasin, Samah Mohamed Saeed, Jeyavijayan Rajendran, and Ozgur Sinanoglu The authors assess and compare the pre-test and post-test activation models of logic encrypted chips.
Cybersecurity for Control Systems: A Process-Aware Perspective
Farshad Khorrami, Prashanth Krishnamurthy, and Ramesh Karri The authors argue that it is vital to develop effective real-time attack monitoring and threat mitigation mechanisms.
Cross-layer secure cyber-physical control system design for networked 3D printers
Zhiheng Xu, Quanyan Zhu The authors explore the vulnerabilities of 3D-printing systems, and design a cross-layer approach for the system.
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
Fei Miao, Quanyan Zhu, Miroslav Pajic, and George J. Pappas This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks.
Controlling your control flow graph
Arun Kanuparthi, Jeyavijayan Rajendran, Ramesh Karri In this paper, the authors propose Dynamic Sequence Checker (DSC), a framework to verify the validity of control flow between basic blocks in the program