Search Results for author: Trent Jaeger

Found 3 papers, 0 papers with code

Adversarial Plannning

no code implementations1 May 2022 Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin Chan, Trent Jaeger, Patrick McDaniel

We evaluate the performance of the algorithms against two dominant planning algorithms used in commercial applications (D* Lite and Fast Downward) and show both are vulnerable to extremely limited adversarial action.

Autonomous Vehicles Management

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

no code implementations6 Feb 2018 Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices.

Cryptography and Security

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

no code implementations1 Apr 2016 Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger

We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively.

Cryptography and Security Operating Systems

Cannot find the paper you are looking for? You can Submit a new open access paper.