Skip to main content

Showing 1–6 of 6 results for author: Othmane, L b

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.00876  [pdf, other

    cs.CR eess.SY

    Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System

    Authors: Mubark B. Jedh, Lotfi ben Othmane, Arun K. Somani

    Abstract: The Adaptive Cruise Control (ACC) system automatically adjusts the vehicle speed to maintain a safe distance between the vehicle and the lead (ahead) vehicle. The controller's decision to accelerate or decelerate is computed using the target speed of the vehicle and the difference between the vehicle's distance to the lead vehicle and the safe distance from that vehicle. Spoofing the vehicle speed… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  2. arXiv:2201.12879  [pdf, other

    cs.CR

    Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline

    Authors: Nicholas Pecka, Lotfi ben Othmane, Altaz Valani

    Abstract: Companies are misled into thinking they solve their security issues by using a DevSecOps system. This paper aims to answer the question: Could a DevOps pipeline be misused to transform a securely developed application into an insecure one? To answer the question, we designed a typical DevOps pipeline utilizing Kubernetes (K8s} as a case study environment and analyzed the applicable threats. Then,… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

  3. arXiv:2201.06680  [pdf, other

    cs.CR

    Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles

    Authors: Mubark B Jedh, Jian Kai Lee, Lotfi ben Othmane

    Abstract: Attackers demonstrated the use of remote access to the in-vehicle network of connected vehicles to launch cyber-attacks and remotely take control of these vehicles. Machine-learning-based Intrusion Detection Systems (IDSs) techniques have been proposed for the detection of such attacks. The evaluation of some of these IDS demonstrated their efficacy in terms of accuracy in detecting message inject… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  4. arXiv:2104.03763  [pdf, other

    cs.CR eess.SY

    Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs

    Authors: Mubark Jedh, Lotfi ben Othmane, Noor Ahmed, Bharat Bhargava

    Abstract: The smart features of modern cars are enabled by a number of Electronic Control Units (ECUs) components that communicate through an in-vehicle network, known as Controller Area Network (CAN) bus. The fundamental challenge is the security of the communication link where an attacker can inject messages (e.g., increase the speed) that may impact the safety of the driver. Develo** an effective defen… ▽ More

    Submitted 8 April, 2021; v1 submitted 8 April, 2021; originally announced April 2021.

  5. arXiv:2103.04226  [pdf, other

    cs.CR

    Threat Modeling of Cyber-Physical Systems in Practice

    Authors: Ameerah-Muhsinah Jamil, Lotfi ben Othmane, Altaz Valani

    Abstract: Traditional Cyber-physical Systems(CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks. As these systems now become more integrated with Information Technology (IT) networks based on IP, they expose vulnerabilities that can be exploited by the attackers through these IT networks. The attackers can control such systems and cause behavior t… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

  6. arXiv:2102.09905  [pdf, other

    cs.SE cs.CY

    Self-Confidence of Undergraduate Students in Designing Software Architecture

    Authors: Lotfi ben Othmane, Ameerah-Muhsina Jamil

    Abstract: Software architecture students, often, lack self-confidence in their ability to use their knowledge to design software architectures. This paper investigates the relations between undergraduate software architecture students' self-confidence and their course expectations, cognitive levels, preferred learning methods, and critical thinking. We developed a questionnaire with open-ended questions to… ▽ More

    Submitted 12 July, 2022; v1 submitted 18 February, 2021; originally announced February 2021.