Skip to main content

Showing 1–2 of 2 results for author: Celik, Z B

Searching in archive eess. Search in all archives.
.
  1. arXiv:2006.14679  [pdf, other

    eess.SP cs.CY eess.SY

    On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

    Authors: Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan Gerdes, Z. Berkay Celik

    Abstract: Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and in… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  2. arXiv:1805.08876  [pdf, other

    cs.CR eess.SY

    Soteria: Automated IoT Safety and Security Analysis

    Authors: Z. Berkay Celik, Patrick McDaniel, Gang Tan

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital systems have changed the way we live, play and work. Yet existing IoT platforms cannot evaluate whether an IoT app or environment is safe, secure, and operates correctly. In this paper, we present Soteria, a static analysis system for validating whether an IoT app or IoT… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: Accepted to the USENIX Annual Technical Conference (USENIX ATC), 2018