{DnD}: A {Cross-Architecture} deep neural network decompiler

R Wu, T Kim, DJ Tian, A Bianchi, D Xu - 31st USENIX Security …, 2022 - usenix.org
The usage of Deep Neural Networks (DNNs) has steadily increased in recent years.
Especially when used in edge devices, dedicated DNN compilers are used to compile DNNs …

[HTML][HTML] Flash controller-based secure execution environment for protecting code confidentiality

Z Zhang, J Xue, T Chen, Y Zhao, W Meng - Journal of Systems Architecture, 2024 - Elsevier
With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to
the Internet, collecting information via tags and sensors. For an IoT device, the application …

{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

Get your cyber-physical tests done! data-driven vulnerability assessment of robotic aerial vehicles

A Ding, M Chan, A Hass… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …

Shimware: Toward practical security retrofitting for monolithic firmware images

E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …

Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent

R Han, S Xu, J Li, E Bertino, D Lo, JF Ma… - ACM Transactions on …, 2024 - dl.acm.org
Configurations are supported by most flight control systems, allowing users to control a flying
drone adapted to complexities such as environmental changes or mission alterations. Such …

Get your cyber-physical tests done! data-driven vulnerability assessment of robotic vehicle

A Ding, M Chan, A Hassanzadeh, NO Tippenhauer… - 2023 - publications.cispa.de
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …

Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration

D Ryu, G Kim, D Lee, S Kim, S Bae, J Rhee… - Proceedings of the 39th …, 2024 - dl.acm.org
Data Distribution Service (DDS) is a distributed network protocol widely used in cyber-
physical systems. DDS provides flexible configurations defined in the formal design …

REMaQE: Reverse Engineering Math Equations from Executables

M Udeshi, P Krishnamurthy, H Pearce, R Karri… - ACM Transactions on …, 2024 - dl.acm.org
Cybersecurity attacks on embedded devices for industrial control systems and cyber-
physical systems may cause catastrophic physical damage as well as economic loss. This …

Trustworthy machine learning for securing cyber-physical systems

M Chan - 2024 - rucore.libraries.rutgers.edu
Industrial control systems (ICS) are a class of cyber-physical systems (CPS) that typically
consist of industrial controllers sensing and actuating safety-critical applications, eg, the …