10th November 2023
Japan-New Zealand Catalyst Grant
Assoc Professor Ian Welch
ian.welch@vuw.ac.nz
https://www.linkedin.com/in/ianswelch
Te Herenga Waka, Victoria University of Wellington
Privacy ensuring e-commerce transactions (Ben Palmer) - multipart computation, interactive zero knowledge proofs, formal modeling
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks (Masood Mansoori) - empirical, hazop for experiments
Early detection of ransomware (Shabbir Abbasi) - evolutionary computing, sequence aware machine learning
One-shot learning for malware detection (Jinting Zhu) - siamese neural networks, adversary machine learning
Automated threat analysis for IoT devices (Junaid Haseeb - unsupervised machine learning, autoencoders, extraction semantic information)
Potential avenues.
Cybersecurity for Intelligent Transport Systems.
- cars, pedestrians, (cycles)
- smart city interaction
Two recent survey papers:
- threats from malware
- adverserial machine learning
Inter-vehicle denial-of-service attacks.
Targets vehicles or infrastructure.
Basic - resource exhaustion.
Extended - jam channels.
Distributed denial of services - vehicles and infrastructure.
Solutions (voting to ignore bad actors, blockchain)
Text
Al-Sabaawi, A., Al-Dulaimi, K., Foo, E., & Alazab, M. (2021). Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges. In M. Stamp, M. Alazab, & A. Shalaginov (Eds.), Malware Analysis Using Artificial Intelligence and Deep Learning (pp. 97–119). Springer International Publishing. https://doi.org/10.1007/978-3-030-62582-5_4
Inter-vehicle other attacks.
GPS spoofing - powergrid solution is spoofing detection).
Masquerading and Sybil attacks - concealment and duplication.
Impersonation - steal identity.
Effects - fake damaging roadway, traffic congestion, crashes.
Intra-vehicle communication.
- indirect physical access (media system via MP3 files, docking ports, CAN bus via ODB port)
- short-range wireless access (bluetooth, keyless entry, tire pressure)
- long-range wireless (remote telematics, cellular access)
Inter-vehicle communication.
Intra-vehicle communication.
Anomaly detection looks possible area mirroring other systems.
But there are challenges specific to transport
- secure vs safe
- real-time constraints
M. Girdhar, J. Hong and J. Moore, "Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models," in IEEE Open Journal of Vehicular Technology, vol. 4, pp. 417-437, 2023, doi: 10.1109/OJVT.2023.3265363.
AVs use ML in four key areas: perception, prediction, planning, and control.
ML algorithms handle tasks like object detection, traffic sign recognition, and decision-making.
Intentional threats include attacks exploiting AI weaknesses to impair AV operations.
ML models can be manipulated by adversarial attacks during training or post-training.
Proactive defenses attempt to strengthen a neural network's resistance toward adversarial examples in advance of an attack.
Reactive defenses aim at detecting adversarial input observations or examples after the neural network models are trained.
These techniques can also be broadly categorized into three groups, 1) manipulating data, 2) introducing auxiliary models, and 3) altering models.
There are many state-of-the-art defences.
Haven't been (necessarily) validated in this context.
Must also meet safety requirements that other context might not have?