Biblio

Filters: Author is Srivastava, Mani  [Clear All Filters]
2023-02-24
Abdelzaher, Tarek, Bastian, Nathaniel D., Jha, Susmit, Kaplan, Lance, Srivastava, Mani, Veeravalli, Venugopal V..  2022.  Context-aware Collaborative Neuro-Symbolic Inference in IoBTs. MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM). :1053—1058.
IoBTs must feature collaborative, context-aware, multi-modal fusion for real-time, robust decision-making in adversarial environments. The integration of machine learning (ML) models into IoBTs has been successful at solving these problems at a small scale (e.g., AiTR), but state-of-the-art ML models grow exponentially with increasing temporal and spatial scale of modeled phenomena, and can thus become brittle, untrustworthy, and vulnerable when interpreting large-scale tactical edge data. To address this challenge, we need to develop principles and methodologies for uncertainty-quantified neuro-symbolic ML, where learning and inference exploit symbolic knowledge and reasoning, in addition to, multi-modal and multi-vantage sensor data. The approach features integrated neuro-symbolic inference, where symbolic context is used by deep learning, and deep learning models provide atomic concepts for symbolic reasoning. The incorporation of high-level symbolic reasoning improves data efficiency during training and makes inference more robust, interpretable, and resource-efficient. In this paper, we identify the key challenges in developing context-aware collaborative neuro-symbolic inference in IoBTs and review some recent progress in addressing these gaps.
2022-06-06
Elmalaki, Salma, Ho, Bo-Jhang, Alzantot, Moustafa, Shoukry, Yasser, Srivastava, Mani.  2019.  SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. 2019 IEEE Security and Privacy Workshops (SPW). :163–168.
Personalized IoT adapt their behavior based on contextual information, such as user behavior and location. Unfortunately, the fact that personalized IoT adapt to user context opens a side-channel that leaks private information about the user. To that end, we start by studying the extent to which a malicious eavesdropper can monitor the actions taken by an IoT system and extract user's private information. In particular, we show two concrete instantiations (in the context of mobile phones and smart homes) of a new category of spyware which we refer to as Context-Aware Adaptation Based Spyware (SpyCon). Experimental evaluations show that the developed SpyCon can predict users' daily behavior with an accuracy of 90.3%. Being a new spyware with no known prior signature or behavior, traditional spyware detection that is based on code signature or system behavior are not adequate to detect SpyCon. We discuss possible detection and mitigation mechanisms that can hinder the effect of SpyCon.
2020-08-24
Noor, Joseph, Ali-Eldin, Ahmed, Garcia, Luis, Rao, Chirag, Dasari, Venkat R., Ganesan, Deepak, Jalaian, Brian, Shenoy, Prashant, Srivastava, Mani.  2019.  The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability. MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). :821–826.
Autonomic resource management for distributed edge computing systems provides an effective means of enabling dynamic placement and adaptation in the face of network changes, load dynamics, and failures. However, adaptation in-and-of-itself offers a side channel by which malicious entities can extract valuable information. An attacker can take advantage of autonomic resource management techniques to fool a system into misallocating resources and crippling applications. Using a few scenarios, we outline how attacks can be launched using partial knowledge of the resource management substrate - with as little as a single compromised node. We argue that any system that provides adaptation must consider resource management as an attack surface. As such, we propose ADAPT2, a framework that incorporates concepts taken from Moving-Target Defense and state estimation techniques to ensure correctness and obfuscate resource management, thereby protecting valuable system and application information from leaking.
2019-03-25
Liu, Renju, Srivastava, Mani.  2018.  VirtSense: Virtualize Sensing Through ARM TrustZone on Internet-of-Things. Proceedings of the 3rd Workshop on System Software for Trusted Execution. :2–7.
Internet-of-Things (IoTs) are becoming more and more popular in our life. IoT devices are generally designed for sensing or actuation purposes. However, the current sensing system on IoT devices lacks the understanding of sensing needs, which diminishes the sensing flexibility, isolation, and security when multiple sensing applications need to use sensor resources. In this work, we propose VirtSense, an ARM TrustZone based virtual sensing system, to provide each sensing application a virtual sensor instance, which further enables a safe, flexible and isolated sensing environment on the IoT devices. Our preliminary results show that VirtSense: 1) can provide virtual sensor instance for each sensing application so that the sensing needs of each application will be satisfied without affecting others; 2) is able to enforce access control policy even under an untrusted environment.
2018-05-25
Alanwar, Amr, Ferraz, Henrique, Hsieh, Kevin, Thazhath, Rohit, Martin, Paul, Hespanha, Joao, Srivastava, Mani.  2017.  D-SLATS: Distributed Simultaneous Localization and Time Synchronization. Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. :14.
Alanwar, Amr, Shoukry, Yasser, Chakraborty, Supriyo, Balaji, Bharathan, Martin, Paul, Tabuada, Paulo, Srivastava, Mani.  2017.  PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract. Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks. :257–258.
Alanwar, Amr, Alzantot, Moustafa, Ho, Bo-Jhang, Martin, Paul, Srivastava, Mani.  2017.  SeleCon: Scalable IoT Device Selection and Control Using Hand Gestures. Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. :47–58.
Martin, Paul, Medvesek, Jan, Symington, Andrew, Srivastava, Mani, Hailes, Stephen.  2015.  Low-Overhead Gaussian-Process Training for Indoor Positioning Systems. Sixth International Conference on Indoor Positioning and Indoor Navigation (IPIN 2015).
Symington, Andrew, Medvesek, Jan, Martin, Paul, Srivastava, Mani, Hailes, Stephen.  2015.  Real-time Indoor Localization using Magnetic, Time of Flight, and Signal Strength Inference Maps. Indoor Location Competition at the ACM/IEEE Information Processing in Sensor Networks (IPSN).