Visible to the public Biblio

Found 252 results

Filters: First Letter Of Last Name is D  [Clear All Filters]
2018-05-17
DeBruin, Samuel, Ghena, Branden, Kuo, Ye-Sheng, Dutta, Prabal.  2015.  PowerBlade: A Low-Profile, True-Power, Plug-Through Energy Meter. Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems.
Zachariah, Thomas, Adkins, Joshua, Dutta, Prabal.  2015.  Browsing the Web of Things with Summon. Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. :481–482.
Kempke, Benjamin, Pannuto, Pat, Campbell, Bradford, Adkins, Joshua, Dutta, Prabal.  2015.  PolyPoint: High-Precision Indoor Localization with UWB. Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems.
Campbell, Bradford, Adkins, Joshua, Dutta, Prabal.  2016.  Cinamin: A Perpetual and Nearly Invisible BLE Beacon. Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks.
Kempke, Benjamin, Pannuto, Pat, Dutta, Prabal.  2016.  Harmonium: Asymmetric, Bandstitched UWB for Fast, Accurate, and Robust Indoor Localization. Proceedings of the 15th International Conference on Information Processing in Sensor Networks.
2018-05-16
Xiang Huang, Donald M. Stull.  2016.  Polynomial Space Randomness in Analysis. 41st International Symposium on Mathematical Foundations of Computer Science, {MFCS} 2016, August 22-26, 2016 - Kraków, Poland. :86:1–86:13.
Neil Lutz, Donald M. Stull.  2017.  Bounding the Dimension of Points on a Line. Theory and Applications of Models of Computation - 14th Annual Conference, {TAMC} 2017, Bern, Switzerland, April 20-22, 2017, Proceedings. :425–439.
Neil Lutz, Donald M. Stull.  2017.  Dimension Spectra of Lines. Unveiling Dynamics and Complexity - 13th Conference on Computability in Europe, CiE 2017, Turku, Finland, June 12-16, 2017, Proceedings. :304–314.
Adam Case, Jack H. Lutz, Donald M. Stull.  2016.  Reachability Problems for Continuous Chemical Reaction Networks. Unconventional Computation and Natural Computation - 15th International Conference, {UCNC} 2016, Manchester, UK, July 11-15, 2016, Proceedings. :1–10.
Wu, Guojun, Ding, Yichen, Li, Yanhua, Bao, Jie, Zheng, Yu, Luo, Jun.  2017.  Mining Spatio-Temporal Reachable Regions over Massive Trajectory Data. The 33rd International Conference on Data Engineering (ICDE 2017). :1–12.
Wu, Guojun, Ding, Yichen, Li, Yanhua, Luo, Jun, Zhang, Fan, Fu, Jie.  2017.  Data-driven inverse learning of passenger preferences in urban public transits. The 56th IEEE Conference on Decision and Control (CDC 2017). :1–6.
Dong, Zhen, Liu, Cong, Li, Yanhua, Bao, Jie, He, Tian.  2017.  REC: Predictable Charging Scheduling for Electric Taxi Fleets. IEEE Real-Time Systems Symposium (RTSS 2017). :1–10.
2018-05-15
Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray.  2017.  POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017. :2559–2561.
Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose Gamble.  2016.  Practical DoS Attacks on Embedded Networks in Commercial Vehicles. Information Systems Security. 10063:23-42.

The Controller Area Network (CAN) protocol has become the primary choice for in-vehicle communications for passenger cars and commercial vehicles. However, it is possible for malicious adversaries to cause major damage by exploiting flaws in the CAN protocol design or implementation. Researchers have shown that an attacker can remotely inject malicious messages into the CAN network in order to disrupt or alter normal vehicle behavior. Some of these attacks can lead to catastrophic consequences for both the vehicle and the driver. Although there are several defense techniques against CAN based attacks, attack surfaces like physically and remotely controllable Electronic Control Units (ECUs) can be used to launch attacks on protocols running on top of the CAN network, such as the SAE J1939 protocol. Commercial vehicles adhere to the SAE J1939 standards that make use of the CAN protocol for physical communication and that are modeled in a manner similar to that of the ISO/OSI 7 layer protocol stack. We posit that the J1939 standards can be subjected to attacks similar to those that have been launched successfully on the OSI layer protocols. Towards this end, we demonstrate how such attacks can be performed on a test-bed having 3 J1939 speaking ECUs connected via a single high-speed CAN bus. Our main goal is to show that the regular operations performed by the J1939 speaking ECUs can be disrupted by manipulating the packet exchange protocols and specifications made by J1939 data-link layer standards. The list of attacks documented in this paper is not comprehensive but given the homogeneous and ubiquitous usage of J1939 standards in commercial vehicles we believe these attacks, along with newer attacks introduced in the future, can cause widespread damage in the heavy vehicle industry, if not mitigated pro-actively.

D. Pickem, P. Glotfelter, L. Wang, M. Mote, A. Ames, E. Feron, M. Egerstedt.  2017.  The Robotarium: A Remotely Accessible Swarm Robotics Research Testbed. {IEEE} International Conference on Robotics and Automation.
D. W. Smith, R. G. Sanfelice.  2016.  Autonomous Waypoint Transitioning and Loitering for Unmanned Aerial Vehicles via Hybrid Control. Proceedings of AIAA Guidance, Navigation and Control Conference.
2018-05-14