Ryan M. Gerdes

Orcid: 0000-0003-0876-1181

According to our database1, Ryan M. Gerdes authored at least 75 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures.
ACM Trans. Cyber Phys. Syst., April, 2024

Securing Your Airspace: Detection of Drones Trespassing Protected Areas.
Sensors, April, 2024

VOGUES: Validation of Object Guise using Estimated Components.
Proceedings of the 33rd USENIX Security Symposium, 2024

The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Learning Based Longitudinal Vehicle Platooning Threat Detection, Identification and Mitigation.
IEEE Trans. Intell. Veh., January, 2023

That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems.
Proceedings of the 31st International Conference on Real-Time Networks and Systems, 2023

Better Side-Channel Attacks Through Measurements.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Survey of Control-flow Integrity Techniques for Real-time Embedded Systems.
ACM Trans. Embed. Comput. Syst., 2022

Passive Drone Localization Using LTE Signals.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Wireless Spiking of Smart Locks.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Secure CV2X Using COTS Smartphones over LTE Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2022

Physical Hijacking Attacks against Object Trackers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Wireless Manipulation of Serial Communication.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Low Cost, Open-Source Platform to Enable Full-Sized Automated Vehicle Research.
IEEE Trans. Intell. Veh., 2021

On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation.
J. Hardw. Syst. Secur., 2021

Intelligent Transportation System Security: Impact-Oriented Risk Assessment of in-Vehicle Networks.
IEEE Intell. Transp. Syst. Mag., 2021

Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems.
CoRR, 2021

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons.
IEEE Trans. Veh. Technol., 2020

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.
CoRR, 2020

SVM: secure vehicle motion verification with a single wireless receiver.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Spotr: GPS spoofing detection via device fingerprinting.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

TEECheck: Securing Intra-Vehicular Communication Using Trusted Execution.
Proceedings of the 28th International Conference on Real Time Networks and Systems, 2020

GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

Linear-Quadratic Game Theoretic Analysis for Securing Battery Management Power Converter Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

On the Efficacy of Model-Based Attack Detectors for Unmanned Aerial Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Return-oriented programming on a resource constrained device.
Sustain. Comput. Informatics Syst., 2019

JCN October special issue on IoT security and privacy.
J. Commun. Networks, 2019

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures.
CoRR, 2019

Crowdsourced measurements for device fingerprinting.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Z Table: Cost-Optimized Attack on Reinforcement Learning.
Proceedings of the First IEEE International Conference on Trust, 2019

The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning.
Proceedings of the Security and Privacy in Communication Networks, 2019

Optimized trusted execution for hard real-time applications on COTS processors.
Proceedings of the 27th International Conference on Real-Time Networks and Systems, 2019

On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019

Learning-based adversarial agent detection and identification in cyber physical systems applied to autonomous vehicular platoon.
Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2019

An Intermittent Learning Algorithm for High-Speed Autonomous Driving in Unknown Environments.
Proceedings of the 2019 American Control Conference, 2019

SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018

Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
Hum. Factors, 2018

Vehicle Security: Risk Assessment in Transportation.
CoRR, 2018

Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Electromagnetic Induction Attacks Against Embedded Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Multi-vehicle Path Following using Modified Trajectory Shaping Guidance.
CoRR, 2017

Low Cost, Open-Source Testbed to Enable Full-Sized Automated Vehicle Research.
CoRR, 2017

Return-Oriented Programming on a Cortex-M Processor.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Application of Work Domain Analysis for Cybersecurity.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning.
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017

A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Towards physical layer identification of cognitive radio devices.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Visual distance estimation for pure pursuit based platooning with a monocular camera.
Proceedings of the 2017 American Control Conference, 2017

2016
Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

Device Measurement and Origin of Variation.
Proceedings of the Digital Fingerprinting, 2016

2015
Remote Activation of Hardware Trojans via a Covert Temperature Channel.
Proceedings of the Security and Privacy in Communication Networks, 2015

Physical-Layer Detection of Hardware Keyloggers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

Vehicular Platooning in an Adversarial Environment.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Friendly Jamming for Secure Localization in Vehicular Transportation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
CPS: an efficiency-motivated attack against autonomous vehicular transportation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Physical-Layer Identification of Wired Ethernet Devices.
IEEE Trans. Inf. Forensics Secur., 2012

Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems.
Proceedings of the Security and Privacy in Communication Networks, 2012

2008
Attempts at gauge determination in superconducting transmission lines.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

2006
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006


  Loading...