{"title":"Introduction to Special Issue on Cybersecurity and Resiliency for Transportation Cyber-Physical Systems","authors":"Mizanur Rahman, Mhafuzul Islam, Lipika Deka, Mashrur Chowdhury","doi":"10.1145/3676850","DOIUrl":"https://doi.org/10.1145/3676850","url":null,"abstract":"","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":"32 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141924511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kshitij Bhardwaj, B. Kailkhura, Kartikeya Bhardwaj, Carlee Joe-Wong
{"title":"Introduction to the Special Issue on Full-Stack Codesign for Robust and Secure AI-Enabled Autonomous Transportation Systems","authors":"Kshitij Bhardwaj, B. Kailkhura, Kartikeya Bhardwaj, Carlee Joe-Wong","doi":"10.1145/3665989","DOIUrl":"https://doi.org/10.1145/3665989","url":null,"abstract":"","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":"34 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141814311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie zhang, Dailin Li, Hongyan Zhang, Fengxian Wang, Yiben Chen, Linwei Li
{"title":"Small object intelligent Detection method based on Adaptive Cascading Context","authors":"Jie zhang, Dailin Li, Hongyan Zhang, Fengxian Wang, Yiben Chen, Linwei Li","doi":"10.1145/3665649","DOIUrl":"https://doi.org/10.1145/3665649","url":null,"abstract":"With the technology advances, deep learning-based object detection has made unprecedented progress. However, the small spatial ratio of object pixels affects the effective extraction of deep details features, resulting in poor detection results in small object detection. To improve the accuracy of small object detection, an adaptive Cascading Context small (ACC) object detection method is proposed based on YOLOv5. Firstly, a separate shallow layer feature was proposed to obtain more detailed information beneficial to small object detection. Secondly, an adaptive cascade method is proposed to fuse the output features of the three layers of the pyramid to adaptively filter negative semantic information, while fusing with shallow features to solve the problem of low classification accuracy caused by insufficient semantic information of shallow features. Finally, an adaptive context model is proposed to use a deformable convolution to obtain spatial context features of shallow small objects, associating the targets with the background, thereby improving the accuracy of small object detection. The experimental results show that the detection accuracy of the proposed method has been improved by 6.12%, 3.35%, 3.33%, and 5.2%, respectively, compared with the source code on the PASCAL VOC, NWPU VHR-10, KITTI, and RSOD datasets, which fully demonstrate the effectiveness of our method in small object detection.","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivia Weng, Andres Meza, Quinlan Bock, B. Hawks, Javier Campos, Nhan Tran, J. Duarte, Ryan Kastner
{"title":"FKeras: A Sensitivity Analysis Tool for Edge Neural Networks","authors":"Olivia Weng, Andres Meza, Quinlan Bock, B. Hawks, Javier Campos, Nhan Tran, J. Duarte, Ryan Kastner","doi":"10.1145/3665334","DOIUrl":"https://doi.org/10.1145/3665334","url":null,"abstract":"\u0000 Edge computation often requires robustness to faults, e.g., to reduce the effects of transient errors and to function correctly in high radiation environments. In these cases, the edge device must be designed with fault tolerance as a primary objective.\u0000 FKeras\u0000 is a tool that helps design fault-tolerant edge neural networks that run entirely on chip to meet strict latency and resource requirements.\u0000 FKeras\u0000 provides metrics that give a bit-level ranking of neural network weights with respect to their sensitivity to faults.\u0000 FKeras\u0000 includes these sensitivity metrics to guide efficient fault injection campaigns to help evaluate the robustness of a neural network architecture. We show how to use\u0000 FKeras\u0000 in the co-design of edge NNs trained on the high-granularity endcap calorimeter dataset, which represents high energy physics data, as well as the CIFAR-10 dataset. We use\u0000 FKeras\u0000 to analyze a NN’s fault tolerance to consider alongside its accuracy, performance, and resource consumption. The results show that the different NN architectures have vastly differing resilience to faults.\u0000 FKeras\u0000 can also determine how to protect neural network weights best, e.g., by selectively using triple modular redundancy on only the most sensitive weights, which reduces area without affecting accuracy.\u0000","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":"114 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141125736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment","authors":"Anika Anwar, Talal Halabi, Mohammad Zulkernine","doi":"10.1145/3660527","DOIUrl":"https://doi.org/10.1145/3660527","url":null,"abstract":"In recent years, Autonomous Vehicle Networks (AVNs) have gained significant attention for their potential to make transportation safer and more efficient. These networks rely on Vehicle-to-Vehicle (V2V) communication to exchange critical information, such as location, speed, and driving intentions. However, V2V communication also introduces security vulnerabilities that can be exploited to compromise the safety and privacy of drivers and passengers. Malicious or selfish drivers can potentially intercept, modify, and manipulate V2V communication, causing confusion among vehicles or stealing sensitive data. Therefore, in order to identify and mitigate security threats that could jeopardize V2V communication in AVNs, the implementation of a threat prevention framework is imperative. This paper presents a threat prevention framework that assesses security risks dynamically to facilitate secure message forwarding in V2V communication. First, we propose a dynamic risk assessment technique that utilizes the PIER approach to evaluate the level of security threats posed to V2V communication, and ultimately generate a risk score. Second, we develop a security decay assessment method that utilizes ruin theory to continuously monitor security risk within the AVNs. Third, we design a risk-aware message forwarding protocol based on coalitional game theory to facilitate secure V2V communication. Our experiments using the simulator Veins demonstrate the efficiency and scalability of the proposed framework in preventing potential damage caused by common security threats and enhancing the security of the Automated Highway System (AHS).","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":"7 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140671787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CANdid\u0000 : A Stealthy Stepping-Stone Attack to Bypass Authentication on ECUs","authors":"Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, Vyas Sekar","doi":"10.1145/3657645","DOIUrl":"https://doi.org/10.1145/3657645","url":null,"abstract":"A high-entropy source of randomness is an essential component in any secure protocol, required to ensure that protocol elements, such as cryptographic keys, nonces, or salts, are unpredictable for the attackers. Resource-constrained embedded devices, such as Electronic Control Units (ECUs) in modern vehicles, often utilize weak sources of randomness due to the unavailability of true sources of randomness. In this paper, we illustrate the ability of a relatively simple adversary to exploit this weakness within ECUs of vehicles produced by major manufacturers. We demonstrate that the weakness can be exploited by the adversary on a real ECU to breach the protection of Unified Diagnostic Services (UDS) Security Access service and access restricted functionality of the UDS protocol. We develop CANdid, a stepping-stone attack strategy where an adversary with access to a non-critical ECU can utilize this weakness to maliciously reprogram an arbitrary critical ECU over the CAN bus.","PeriodicalId":474318,"journal":{"name":"ACM Journal on Autonomous Transportation Systems","volume":" 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140690847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}