Publications

Visible to the public 

P U B L I C A T I O N S   

  1. Siyuan Dai, Zhenkai Zhang, and Xenofon Koutsoukos. A model-based design approach for simulation and virtual prototyping of automotive control systems using port-Hamiltonian systemsSoftware & Systems Modeling, 18(3): 1637-1653 June 2019. https://doi.org/10.1007/s10270-017-0646-1

  2. Siyuan Dai and Xenofon Koutsoukos. Safety Analysis of Integrated Adaptive Cruise and Lane Keeping Control Using Multi-Modal Port-Hamiltonian Systems. Nonlinear Analysis: Hybrid Systems, Volume 35, February 2020. https://doi.org/10.1016/j.nahs.2019.100816

  3. Bradley Potteiger, Zhenkai Zhang and Xenofon Koutsoukos. Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems. Symposium and Bootcamp on the Science of Security, HotSoS 2018, Raleigh, NC, April 10-11, 2018. https://doi.org/10.1145/3190619.3190636

  4. Hoang-Dung Tran, Feiyang Cai, Diego Manzanas Lopez, Patrick Musau, Taylor T. Johnson, Xenofon Koutsoukos. Safety Verification of Cyber-Physical Systems with Reinforcement Learning Control2nd Workshop on Formal Methods for ML-Enabled Autonomous Systems Affiliated with CAV 2019 (FoMLAS 2019), July 14, 2019 https://docs.wixstatic.com/ugd/a665a2_db51efe65b2e4bc4a4431c9382b01f5b.pdf

  5. Hoang-Dung Tran, Feiyang Cai, Diego Manzanas Lopez, Patrick Musau, Weiming Xiang, Luan Viet Nguyen, Taylor T. Johnson, and Xenofon Koutsoukos. Safety Verification of Cyber-Physical Systems with Reinforcement Learning Control. In ACM SIGBED International Conference on Embedded Software (EMSOFT'19), ACM, 2019, October. https://doi.org/10.1145/3358230

  6. Feiyang Cai and Xenofon Koutsoukos. Real-time Out-of-distribution Detection in Learning-Enabled Cyber Physical Systems. In 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, April 2020. Best Paper Award Finalist https://doi.org/10.1109/ICCPS48487.2020.00024

  7. Feiyang Cai and Xenofon Koutsoukos. Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression. In Workshop on Assured Autonomous Systems, In conjunction with 2020 IEEE S&P,  May 2020. https://doi.org/10.1109/SPW50608.2020.00050

  8. Feiyang Cai and Xenofon Koutsoukos. Real-time Out-of-distribution Detection in Learning-Enabled Cyber Physical Systems. ACM Transactions on Cyber-Physical Systems. Under Review.

  9. Feiyang Cai, Ali Ozdagli, Xenofon Koutsoukos. Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression.  IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2021).  May 10-12, 2021.  https://doi.org/10.1109/ICPS49255.2021.9468230

  10. Feiyang Cai, Ali Ozdagli, Nicholas Potteiger, and Xenofon Koutsoukos. Inductive Conformal Out-of-distribution Detection based on Adversarial Autoencoders. IEEE International Conference on Omni-layer Intelligent systems 2021 (COINS 2021). https://doi.org/10.1109/COINS51742.2021.9524167

  11. Bradley Potteiger, Zhenkai Zhang, and Xenofon Koutsoukos. Integrated Moving Target Defense and Control Reconfiguration for Securing Cyber-Physical SystemsMicroprocessors and Microsystems, Special Issue on Cyber-Physical Systems: Design and Applications. 73, March 2020. https://doi.org/10.1016/j.micpro.2019.102954

  12. Bradley Potteiger, Zhenkai Zhang and Xenofon Koutsoukos. Integrated Data Space Randomization and Control Reconfiguration for Securing Cyber-Physical Systems. In Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS '19). ACM, New York, NY, USA, Article 3, 10 pagesApril 1-3, 2019, Nashville, TN, USA. Best paper award. https://doi.org/10.1145/3314058.3314064

  13. Bradley Potteiger, Feiyang Cai, Zhenkai Zhang, and Xenofon Koutsoukos. Data Space Randomization for Securing Cyber-Physical SystemsInternational Journal of Information Security. Accepted for publication.

  14. Bradley Potteiger, Feiyang Cai, Abhishek Dubey, Xenofon Koutsoukos and Zhenkai Zhang. Security in Mixed Time and Event Triggered Cyber-Physical Systems using Moving Target Defense. In 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC), Nashville, TN, USA, 2020. Nominated for Best Paper and Best Student Paper Award. https://doi.org/10.1109/ISORC49007.2020.00022

  15. Bradley Potteiger, Feiyang Cai, Abhishek Dubey, Xenofon Koutsoukos and Zhenkai Zhang. Moving Target Defense for the Security and Resilience of Mixed Time and Event Triggered Cyber-Physical Systems. Journal of Systems Architecture. Under review.

  16. Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Xenofon Koutsoukos, and Gabor Karsai. Triggering Rowhammer Hardware Faults on ARM: A Revisit. Workshop on Attacks and Solutions in Hardware Security (ASHES 2018). Collocated with the 25th ACM Conference on Computer and Communications Security (CCS 2018). 2018. https://doi.org/10.1145/3266444.3266454

  17. Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Bo Li, Peter Volgyesi and Xenofon Koutsoukos. Leveraging EM Side-Channel Information to Detect Rowhammer Attacks. 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 729-746. https://doi.org/10.1109/SP40000.2020.00060

  18. Zihao Zhan, Zhenkai Zhang, and Xenofon Koutsoukos. BitJabber: The World's Fastest Electromagnetic Covert Channel. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2020), December 2020. Nominated for Best Paper and Best Student Paper Award. https://doi.org/10.1109/HOST45689.2020.9300268

  19. Zihao Zhan, Zhenkai Zhang, and Xenofon Koutsoukos. A High-Speed, Long-Distance and Wall-Penetrating Covert Channel based on EM Emanations from DRAM Clock. Journal of Hardware and Systems Security. Under review.  

  20. Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao. Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. ACM Asia Conference on Computer and Communication Security (Asia CSS ’21), 2021. https://doi.org/10.1145/3433210.3437517

  21. Zhenkai Zhang, Zhishan Guo, and Xenofon Koutsoukos. Handling write backs in multi-level cache analysis for WCET estimation. In Proceedings of the 25th International Conference on Real-Time Networks and Systems (RTNS '17), Grenoble, France, October 4-6 2017. https://doi.org/10.1145/3139258.3139269 

  22. Dimitrios Boursinos and Xenofon Koutsoukos. Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components. Tools and Methods for Competitive Engineering (TMCE 2020), 2020. http://www.vuse.vanderbilt.edu/~koutsoxd/www/Publications/TMCE2020-ESS-CCS-3.pdf

  23. Bradley Potteiger, Zhenkai Zhang, Long Cheng, and Xenofon Koutsoukos. A Tutorial of Moving Target Defense Approaches within Automotive Cyber-Physical Systems. Frontiers in Future Transportation, Connected Mobility and Automation. Submitted for publication.

  24. Zihao Zhan, Zhenkai Zhang, and Xenofon Koutsoukos. Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors. IEEE Symposium on Security & Privacy 2022. Submitted for publication.

  25. Mert Side, Fan Yao, and Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit. European Symposium on Security and Privacy (Euro S&P 2022). Submitted for publication.