Now showing items 1-6 of 6

    • CONSIDERING SAFETY AND SECURITY IN AV FUNCTIONS 

      Sharma, Shefali (University of Waterloo, 2019-08-30)
      Autonomous vehicles (AVs) are coming to our streets. Due to the presence of highly complex software systems in AVs, a new hazard analysis technique is needed to meet stringent safety standards. Also, safety and security ...
    • Decompilation of Binaries into LLVM IR for Automated Analysis 

      Toor, Tejvinder (University of Waterloo, 2022-01-25)
      Complexity in malicious software is increasing to avoid detection and mitigation. As such, there is greater interest in using automation for reverse engineering. Current state-of-the-art tools use proprietary intermediate ...
    • A Machine Learning Approach for RDP-based Lateral Movement Detection 

      Bai, Zhenyu (University of Waterloo, 2019-09-19)
      Detecting cyber threats has been an on-going research endeavor. In this era, advanced persistent threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart ...
    • Secure Data Acquisition for Physics-based Side Channel Cybersecurity 

      Propp, Aaron (University of Waterloo, 2023-08-18)
      Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ...
    • Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology 

      Hussein, Noon (University of Waterloo, 2023-08-31)
      Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, ...
    • Soteria: An Approach for Detecting Multi-Institution Attacks 

      Zabarah, Saif (University of Waterloo, 2023-01-02)
      We present Soteria, a data processing pipeline for detecting multi-institution attacks. Multi-institution attacks contact large number of potential targets looking for vulnerabilities that span multiple institutions. Soteria ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages