PPT-A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939-Based Networks

Author : phoebe-click | Published Date : 2018-12-26

Subhojeet Mukherjee Jacob Walker Indrakshi Ray Colorado State University Jeremy Daily University of Tulsa The Issue at Hand Embedded devices control driving

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "A Precedence Graph-Based Approach to Det..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939-Based Networks: Transcript


Subhojeet Mukherjee Jacob Walker Indrakshi Ray Colorado State University Jeremy Daily University of Tulsa The Issue at Hand Embedded devices control driving critical operations ECUs. Introduction. 2. Model: Social Graph. From SIGMOD11-tutorial. 3. Model: Social Graph. From SIGMOD11-tutorial. 4. Model: Social Graph. From SIGMOD11-tutorial. 5. Model: Social Graph. Facebook. graph from: . PRESENTED By. Sravani . kambam. 1. Outline:. Introduction. Attacks on Wi-Fi . . Networks. DAIR Architecture. Detecting Attacks. Experimental Results. Channel Assignment. Limitations. Related Work. Future Work. DoS Attacks . in . Broadcast Authentication . in . Sensor Networks. . (. Ronghua. Wang, . Wenliang. Du, . Peng. . Ning. ). Advanced Computer Networks . CS577 – Fall 2013. WPI, Worcester.. Presented by . Stealing the Pie Without Touching the Sill. Background. XSS recently replaced SQL injection and . related server-side . injection attacks as the number one . threat in . the OWASP . (Open Web Application Security Project) ranking.. Fabian Kuhn. Algorithms and Complexity Group. University of Freiburg. Germany. 2. Modeling Wireless Communication. Network modeled as a graph . k. nown as “radio network model” or “protocol model”. Based on material by Prof. Vern . Paxson. , UC Berkeley. Detecting Attacks. Given a choice, we’d like our systems to be airtight-secure. But often we don’t have that choice. #1 reason why not: cost (in different dimensions). Arijit. Khan, Nan Li, . Xifeng. Yan, . Ziyu. Guan. Computer Science . UC Santa Barbara. {. arijitkhan. , . nanli. , . xyan. , . ziyuguan. }@. cs.ucsb.edu. . Supriyo. Chakraborty. UC Los Angeles. Based on material by Prof. Vern . Paxson. , UC Berkeley. Detecting Attacks. Given a choice, we’d like our systems to be airtight-secure. But often we don’t have that choice. #1 reason why not: cost (in different dimensions). Paxson. , UC Berkeley. Detecting Attacks. Given a choice, we’d like our systems to be airtight-secure. But often we don’t have that choice. #1 reason why not: cost (in different dimensions). A (messy) alternative: detect misuse rather than build a system that can’t be misused. Contact: . Ibéria. Medeiros, Nuno . Neves. {. imedeiros. , nuno}@. di.fc.ul.pt. . FCiências.ID / LASIGE, . Faculdade. de . Ciências. , . Universidade. de . Lisboa. www.navigators.di.fc.ul.pt. Databases continue to be the most commonly used backend storage in enterprises, and are employed in several contexts in the electrical grid. They are often integrated with vulnerable applications, such as web frontends, that allow injection attacks to be performed. The effectiveness of such attacks steams from a . Fanjin. Zhang, Xiao Liu, . Jie. Tang, . Yuxiao. Dong, . Peiran. Yao, . Jie. Zhang, . Xiaotao. Gu, Yan Wang, Bin Shao, Rui Li and . Kuansan. Wang.. Tsinghua University Microsoft Research. Arijit. Khan, Nan Li, . Xifeng. Yan, . Ziyu. Guan. Computer Science . UC Santa Barbara. {. arijitkhan. , . nanli. , . xyan. , . ziyuguan. }@. cs.ucsb.edu. . Supriyo. Chakraborty. UC Los Angeles. Samuel Jero. , . Hyojeong. Lee, and Cristina Nita-. Rotaru. Purdue University. DSN 2015. 1. Transport Protocols . C. ritical to today’s Internet. Used by many applications. Underlie secure protocols like TLS. Secure Real-time Communications over 5G. PhD Researcher Name: . Mohammad Saedi. Supervisors: . Adrian Moore, Christopher Nugent, Philip Perry. Contribution to Knowledge. To create a data set that .

Download Document

Here is the link to download the presentation.
"A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939-Based Networks"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents