Ryan M. Gerdes

According to our database1, Ryan M. Gerdes authored at least 52 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons.
IEEE Trans. Veh. Technol., 2020

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.
CoRR, 2020

SVM: secure vehicle motion verification with a single wireless receiver.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Spotr: GPS spoofing detection via device fingerprinting.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

TEECheck: Securing Intra-Vehicular Communication Using Trusted Execution.
Proceedings of the 28th International Conference on Real Time Networks and Systems, 2020

Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

Linear-Quadratic Game Theoretic Analysis for Securing Battery Management Power Converter Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

On the Efficacy of Model-Based Attack Detectors for Unmanned Aerial Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Return-oriented programming on a resource constrained device.
Sustain. Comput. Informatics Syst., 2019

JCN October special issue on IoT security and privacy.
J. Commun. Networks, 2019

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures.
CoRR, 2019

Crowdsourced measurements for device fingerprinting.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning.
Proceedings of the Security and Privacy in Communication Networks, 2019

Optimized trusted execution for hard real-time applications on COTS processors.
Proceedings of the 27th International Conference on Real-Time Networks and Systems, 2019

On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019

Learning-based adversarial agent detection and identification in cyber physical systems applied to autonomous vehicular platoon.
Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2019

An Intermittent Learning Algorithm for High-Speed Autonomous Driving in Unknown Environments.
Proceedings of the 2019 American Control Conference, 2019

SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018

Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
Hum. Factors, 2018

Vehicle Security: Risk Assessment in Transportation.
CoRR, 2018

Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Electromagnetic Induction Attacks Against Embedded Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Multi-vehicle Path Following using Modified Trajectory Shaping Guidance.
CoRR, 2017

Low Cost, Open-Source Testbed to Enable Full-Sized Automated Vehicle Research.
CoRR, 2017

Return-Oriented Programming on a Cortex-M Processor.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Application of Work Domain Analysis for Cybersecurity.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning.
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017

A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Towards physical layer identification of cognitive radio devices.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Visual distance estimation for pure pursuit based platooning with a monocular camera.
Proceedings of the 2017 American Control Conference, 2017

2016
Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

Device Measurement and Origin of Variation.
Proceedings of the Digital Fingerprinting, 2016

2015
Remote Activation of Hardware Trojans via a Covert Temperature Channel.
Proceedings of the Security and Privacy in Communication Networks, 2015

Physical-Layer Detection of Hardware Keyloggers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

Vehicular Platooning in an Adversarial Environment.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Friendly Jamming for Secure Localization in Vehicular Transportation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
CPS: an efficiency-motivated attack against autonomous vehicular transportation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Physical-Layer Identification of Wired Ethernet Devices.
IEEE Trans. Inf. Forensics Secur., 2012

Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems.
Proceedings of the Security and Privacy in Communication Networks, 2012

2008
Attempts at gauge determination in superconducting transmission lines.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

2006
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006


  Loading...