{"671322":{"#nid":"671322","#data":{"type":"event","title":"PhD Defense by Seulbae Kim","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETitle\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E: Fortifying Cyber-Physical Systems through Comprehensive Bug-finding and Mitigation\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EDate\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E: Friday, December 1, 2023\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETime\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E: 1:30 PM - 3:30 PM ET\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ELocation\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E: CODA C0915 \/ Zoom: \u003Ca href=\u0022https:\/\/gatech.zoom.us\/j\/95775489982\u0022\u003Ehttps:\/\/gatech.zoom.us\/j\/95775489982\u003C\/a\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ESeulbae\u0026nbsp;Kim\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EPh.D. Candidate\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ESchool of Cybersecurity and Privacy\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ECollege of Computing\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EGeorgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ECommittee\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E:\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Taesoo\u0026nbsp;Kim\u0026nbsp;(advisor), School of Computer Science \u0026amp; School of Cybersecurity and Privacy, Georgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Alessandro Orso, School of Computer Science, Georgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr.\u0026nbsp;Saman\u0026nbsp;Zonouz,\u0026nbsp;School of Cybersecurity and Privacy, Georgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Qirun Zhang, School of Computer Science, Georgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Yonghwi Kwon, Department of Electrical \u0026amp; Computer Engineering, University of Maryland\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EAbstract\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EWith the rapid growth of Cyber-Physical Systems (CPS) in various domains, ensuring their security and correctness has become increasingly critical. CPS, intricate amalgamations of physical and cyber components, necessitate security approaches that extend beyond conventional software security methodologies. This thesis focuses on formulating a comprehensive strategy to automatically identify and mitigate cyber-physical bugs and attacks across all layers of CPS, encompassing the application layer, middleware suite, and hardware layer.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EFirst, a vehicular fuzzing framework is developed to uncover logic bugs in autonomous driving system software. This framework uses real-world traffic rules to build driving test oracles and detect safety-critical misbehaviors, such as collisions. The fuzzer generates and mutates realistic driving scenarios and assesses the semantic quality of autonomous driving by referring to the physical states of the vehicle to guide the fuzzing process effectively.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ESecond, a customizable fuzzing framework is devised for Robot Operating System (ROS), a widely used middleware suite for modern robot development. This framework leverages the message-driven distributed architecture of ROS and ROS-based systems to explore system states by injecting data messages. Simultaneously executing the robotic system under test in both the real world and a simulator, this framework captures the states from both domains, scrutinizing for cyber-physical discrepancies that can lead to errors.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EFinally, to safeguard CPS from irreversible damages stemming from bugs, attacks, or user failures, a dynamics-based runtime monitoring system is proposed. This method speculatively predicts future states to proactively detect potential safety violations in advance. Once a forthcoming unsafe state is anticipated, this system searches for corrective maneuvers to divert future states, effectively transforming reactive safety measures into preemptive measures.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EFortifying Cyber-Physical Systems through Comprehensive Bug-finding and Mitigation\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Fortifying Cyber-Physical Systems through Comprehensive Bug-finding and Mitigation"}],"uid":"27707","created_gmt":"2023-11-30 17:45:46","changed_gmt":"2023-11-30 17:45:46","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2023-12-01T13:30:00-05:00","event_time_end":"2023-12-01T15:00:00-05:00","event_time_end_last":"2023-12-01T15:00:00-05:00","gmt_time_start":"2023-12-01 18:30:00","gmt_time_end":"2023-12-01 20:00:00","gmt_time_end_last":"2023-12-01 20:00:00","rrule":null,"timezone":"America\/New_York"},"location":" CODA C0915 \/ Zoom","extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}