skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 2150136

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. We consider the cybersecurity challenges arising from communications between autonomous vehicles and smart infrastructures. In particular, we consider coordination between vehicles and Reduced Speed Work Zones (RSWZ). Malicious or tampered communica- tions between these entities can have catastrophic consequences. We discuss methods for the analysis of such attacks. In particular, we show how to generate congurable, eective vehicular trajecto- ries for exploring such attacks and how to utilize such trajectories in identifying impactful attacks and evaluating defenses. 
    more » « less
  2. Security is a critical challenge in emergent autonomous vehicles. However, the security challenges in automotive systems are not widely understood even in the cybersecurity community. To address this problem, we develop an adaptable exploration platform for automotive security. This platform enables users to gain hands-on experience and insights into security vulnerabilities. We discuss specic challenges and prerequisites involved in designing such an exploration tool. We demonstrate the platform’s capabilities by exploring automotive ranging sensor attacks. 
    more » « less
  3. Modern autonomous vehicles are increasingly infused with sensors, electronics, and software software. One consequence is that they are getting increasingly susceptible to cyber-attacks. However, awareness of cybersecurity challenges for automotive systems remains low. In this paper, we consider the problem of developing a virtual reality (VR) infrastructure that can enable users who are not necessarily experts in automotive security to explore vulnerabilities arising from compromised ranging sensors. A key requirement for such platforms is to develop natural, intuitive scenarios that enable the user to experience security challenges and impact. We discuss the challenges in developing such scenarios, and develop a solution that enables exploration of jamming and spoong attacks. Our solution is integrated into a VR platform for automotive se- curity exploration called IVE (Immersive Virtual Environment). It combines realistic driving with a rst-person view, user interaction, and sound eects to provide all the benets of a real-life simulation without the consequences. 
    more » « less