Investigating secure boot mechanisms, trusted hardware, and more...
Read More
We present a novel framework (S-RFUP) that integrates industry standard protocols (PLDM, MCTP)...
Read More
We introduce the notion of Attack-Connectivity Graph (ACG) that allows us to perform simultaneous modeling of attack...
Read More
We conduct a systematic evaluation of various white-box adversarial attacks, where...
Read More
Enhancing the Protection in Transit (PIT) protocol—which locks devices during transit to prevent unauthorized firmware tampering—we formally verify...
Read More
We present a novel modeling paradigm, Resiliency Graph (RG) that combines the power of Natural Language Processing (NLP) and AI Planning (PDDL)...
Read More