Home
Biography
Teaching
Research
Publication
Team
Contact
Light
Dark
Automatic
Publications
Search/filter publications
Type
Conference paper
Journal article
Book section
Thesis
Patent
Date
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
ZBCAN: A Zero-Byte CAN Defense System
We introduce a defense system that uses zero bytes of the automotive controller area network (CAN) frame to secure against the most common CAN attacks, including message injection, replay, fuzzing, impersonation, flooding, collision injection, bus-off, and network mapping attacks, without using message authentication codes.
Khaled Serag
,
Rohit Bhatia
,
Akram Faqih
,
Muslum Ozgur Ozmen
,
Vireshwar Kumar
,
Z. Berkay Celik
,
Dongyan Xu
August 2023
USENIX Security
Project
Demo: Attacks on CAN Error Handling Mechanism
We discuss the security vulnerabilities of automotive controller area network (CAN) and present three attacks which exploit them.
Khaled Serag
,
Vireshwar Kumar
,
Z. Berkay Celik
,
Rohit Bhatia
,
Mathias Payer
,
Dongyan Xu
February 2022
AutoSec
PDF
Project
Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications
We present a practical runtime remote attestation framework that segments the software and randomizes the integrity check of these segments over short random intervals leading to a novel performance-vs-security trade-off.
Ismi Abidi
,
Vireshwar Kumar
,
Rijurekha Sen
December 2021
ACSAC
PDF
Project
DOI
PASAN: Detecting peripheral access concurrency bugs within bare-metal embedded applications
We propose the first static analysis tool to detect peripheral access concurrency issues for embedded systems.
Taegyu Kim
,
Vireshwar Kumar
,
Junghwan Rhee
,
Jizhou Chen
,
Kyungtae Kim
,
Chunghwan Kim
,
Dongyan Xu
,
Dave Tian
August 2021
USENIX Security
PDF
Project
Exposing new vulnerabilities of error handling mechanism in CAN
We discover three major vulnerabilities in the error handling mechanism of the automotive controller area network that could be exploited to launch a variety of attacks including a denial-of-service attack against benign electronic control units.
Khaled Serag
,
Rohit Bhatia
,
Vireshwar Kumar
,
Z. Berkay Celik
,
Dongyan Xu
August 2021
USENIX Security
PDF
Project
Cumulative message authentication codes for resource-constrained IoT networks
To provide message authenticity in IoT, we employ a speculation procedure for predicting future message values to achieve an advantageous trade-off between the cryptographic strength and the latency in processing of the message authentication codes.
He Li
,
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Yaling Yang
July 2021
IEEE IoT
PDF
Project
DOI
Evading voltage-based intrusion detection on automotive CAN
We discover a novel tactic that can be exploited by two malicious electronic control units (ECUs) on an automotive controller area network to masquerade a benign ECU while evading voltage-based intrusion detection system.
Rohit Bhatia
,
Vireshwar Kumar
,
Khaled Serag
,
Z. Berkay Celik
,
Mathias Payer
,
Dongyan Xu
February 2021
NDSS
PDF
Project
Video
DOI
3D printed graphene-based self-powered strain sensors for smart tires in autonomous vehicles
We design and print a piezoelectric patch for harvesting energy from the automobile tires, which is utilized for powering strain sensing and secure wireless data transfer.
Deepam Maurya
,
Seyedmeysam Khaleghian
,
Rammohan Sriramdas
,
Prashant Kumar
,
Ravi Anant Kishore
,
Min-Gyu Kang
,
Vireshwar Kumar
,
Hyun-Cheol Song
,
Seul-Yi Lee
,
Yongke Yan
,
Jung-Min (Jerry) Park
,
Saied Taheri
,
Shashank Priya
October 2020
Nature Communications
PDF
DOI
BlueShield: Detecting spoofing attacks in Bluetooth low energy networks
We present a legacy-friendly, non-intrusive monitoring system to defend Bluetooth users against spoofing attacks through which an attacker can impersonate an IoT device and feed malicious data to its users.
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
,
Mathias Payer
,
Dongyan Xu
October 2020
RAID
PDF
Project
News
BLESA: Spoofing attacks against reconnections in Bluetooth low energy
We discover critical security vulnerabilities in the Bluetooth Low Energy connection protocol, which can be exploited to impersonate an IoT device and provide spoofed data to a previously-paired user device.
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
,
Dave Tian
,
Antonio Bianchi
,
Mathias Payer
,
Dongyan Xu
August 2020
USENIX WOOT
(
Best Paper Award
)
PDF
Project
Video
News
Cumulative message authentication codes for resource-constrained networks
To provide message authenticity in IoT, we enable the verifier to achieve an advantageous trade-off between the cryptographic strength and the latency in processing of the message authentication codes.
He Li
,
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Yaling Yang
June 2020
IEEE CNS
PDF
Cite
Project
Policy enforcement in dynamic spectrum sharing
We discuss some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and present a taxonomy for classifying the various threats and the developed countermeasures.
Jung-Min (Jerry) Park
,
Vireshwar Kumar
,
Taiwo Oyedare
April 2020
Wiley
PDF
Cite
DOI
Group signatures with probabilistic revocation
We propose a novel notion of probabilistic revocation, which enables a verifier to check the revocation status of the private key of a given signature very efficiently.
Jung-Min (Jerry) Park
,
Vireshwar Kumar
June 2019
U. S. Patent
PDF
Project
News
Crowd-sourced authentication for enforcement in dynamic spectrum sharing
To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.
Vireshwar Kumar
,
He Li
,
Jung-Min (Jerry) Park
,
Kaigui Bian
May 2019
IEEE TCCN
PDF
Cite
Project
DOI
Energy harvesting and strain sensing in smart tire for next generation autonomous vehicles
We design a flexible organic piezoelectric material for harvesting energy from the automobile tires, which is utilized for powering strain sensing and wireless data transfer with enhanced frame rates.
Deepam Maurya
,
Prashant Kumar
,
Seyedmeysam Khaleghian
,
Rammohan Sriramdas
,
Min-Gyu Kang
,
Ravi Anant Kishore
,
Vireshwar Kumar
,
Hyun-Cheol Song
,
Jung-Min (Jerry) Park
,
Saied Taheri
,
Shashank Priya
December 2018
Applied Energy
PDF
DOI
Enforcement in spectrum sharing: Crowd-sourced blind authentication of co-channel transmitters
To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.
Vireshwar Kumar
,
He Li
,
Jung-Min (Jerry) Park
,
Kaigui Bian
October 2018
IEEE DySPAN
PDF
Cite
Project
DOI
Direct anonymous attestation with efficient verifier-local revocation for subscription system
We propose a novel anonymous attestation scheme which enables efficient revocation of a platform by shifting most of the computational and communication costs from the signature generation phase to the key acquisition phase.
Vireshwar Kumar
,
He Li
,
Noah Luther
,
Pranav Asokan
,
Jung-Min (Jerry) Park
,
Kaigui Bian
,
Martin B.H. Weiss
,
Taieb Znati
June 2018
ACM AsiaCCS
PDF
Cite
Project
DOI
Transmitter authentication using hierarchical modulation in dynamic spectrum sharing
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Kaigui Bian
August 2017
JNCA
PDF
Cite
Project
DOI
Transmitter authentication in dynamic spectrum sharing
We develop novel techniques to enable a regulatory enforcement entity to uniquely identify a transmitter and collect verifiable evidence of a rogue transmission that can be used later during an adjudication process.
Vireshwar Kumar
February 2017
Virginia Tech
PDF
News
PHY-layer authentication using duobinary signaling for spectrum enforcement
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Kaigui Bian
May 2016
IEEE TIFS
PDF
Cite
Project
DOI
Group signatures with probabilistic revocation: A computationally-scalable approach for providing privacy-preserving authentication
We propose a novel notion of probabilistic revocation, which enables a verifier to check the revocation status of the private key of a given signature very efficiently.
Vireshwar Kumar
,
He Li
,
Jung-Min (Jerry) Park
,
Kaigui Bian
,
Yaling Yang
August 2015
ACM CCS
PDF
Cite
Project
DOI
News
Security and enforcement in spectrum sharing
We review some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and propose a taxonomy for classifying the various threats and the developed countermeasures.
Jung-Min (Jerry) Park
,
Jeffrey Reed
,
A.A. (Louis) Beex
,
Charles Clancy
,
Vireshwar Kumar
,
Behnam Bahrak
August 2014
Proc. IEEE
(
Invited Paper
)
PDF
Cite
Project
DOI
Blind transmitter authentication for spectrum security and enforcement
We develop a novel mechanism for embedding an authentication information into the transmitted waveform, which can be extracted by an enforcement entity without knowing the transmission parameters.
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Kaigui Bian
May 2014
ACM CCS
PDF
Cite
Project
DOI
PHY-layer authentication using hierarchical modulation and duobinary signaling
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Charles Clancy
,
Kaigui Bian
February 2014
ICNC
PDF
Cite
Project
DOI
PHY-layer authentication by introducing controlled inter symbol interference
We show that the duobinary signaling mechanism introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
Vireshwar Kumar
,
Jung-Min (Jerry) Park
,
Charles Clancy
,
Kaigui Bian
August 2013
IEEE CNS
PDF
Cite
Project
DOI
Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper
We illustrate that the cooperative jamming strategy significantly boosts the secrecy sum-rate rate of the transmitter even if it does not know the channel state information of the eavesdropper.
Shahid Mehraj Shah
,
Vireshwar Kumar
,
Vinod Sharma
June 2012
SPCOM
PDF
Cite
Project
DOI
Cite
×