Vehicle Intrusion Resilience Systems in Action Learn more and Apply Sat, Jul 6 2024 Internship intrusion resilience intrusion detection intrusion prevention vehicular networks CAN byzantine fault tolerance embedded systems vehicular software A modern vehicle is composed of around 100 Electronic Control Unit (ECU) connected via several types of networks. An ECU is an embedded device, similar to a RaspberryPI, running an operating system, e.g., Linux-based or real-time OS, on top of which different software and firmware may run, depending on the application. Due to the imperfection of humans, software can have faults and intrusions, which can lead to catastrophic failures that threatens human lives. A Fault and Intrusion Resilient System (FIRS) is a vehicle middleware that can mask the effect of a failure or intrusion. Contrary to
Useful Bitcoin Mining with a Matrix-based Puzzle Learn more and Apply Sat, Jul 6 2024 Internship supercomputing blockchain cryptocurrency bitcoin mathematics distributed systems Cryptocurrency and blockchain technologies are increasingly gaining adoption since the introduction of Bitcoin, being distributed, authority-free, and secure. Proof of Work (PoW) is at the heart of blockchain’s security, asset generation, and maintenance. In most cryptocurrencies, and mainly Bitcoin, the “work” a miner must do is to solve a cryptographic puzzle: to find a random nonce that once (cryptographically) SHA-256 hashed with a perspective block header, returns a 32 Bytes number having a leading pre-defined number of zeros (called difficulty). This puzzle represents the PoW, and lives
Security analysis of Docker-based containerized environments Learn more and Apply Sat, Jul 6 2024 Internship cybersecurity OS virtualization docker operating systems Linux Python C++ Operating System (OS) virtualization, also known as container-based virtualization, has gained momentum over the past few years thanks to its lightweight nature and support for agility. However, its compelling features come at the price of a reduced isolation level compared to the traditional host-based virtualization techniques, exposing workloads to various faults, such as container escape. Those faults might be manifested as host OS bugs, container runtime vulnerabilities, and/or poor container deployment choices and profile configuration. The latter aspect is particularly critical as
Rejuvenation of Diverse FPGA Softcores in a SoC Learn more and Apply Sat, Jul 6 2024 Internship FPGA system-on-chip SoC replication field-programmable gate array verilog VHDL A field-programmable gate array (FPGA) is an integrated circuit designed to be reconfigured by the user after manufacturing to build a System-on-Chip (SoC) embedded device. The needed logic is usually implemented as a software image and then instantiated on the FPGA to inherit the nice properties of hardware, like higher speed and better security. Unfortunately, since the image itself, e.g., a Softcore that represents a Processing Unit, is a software, it is prone to faults and vulnerabilities that manifest after instantiation on the FPGA. Unfortunately, an Advanced Persistent Threat (APT) is
Monitoring containerized environments for security state error detection Learn more and Apply Sat, Jul 6 2024 Internship operating systems containers cybersecurity Linux Python C++ Operating System (OS) virtualization, also known as container-based virtualization, has gained momentum over the past few years thanks to its lightweight nature and support for agility. However, its compelling features come at the price of a reduced isolation level compared to the traditional host-based virtualization techniques, exposing workloads to various threats, such as container escape. In those threats, compromised or rogue containers might exploit existing vulnerabilities or poor container deployment choices to successfully inject security state errors (e.g., breaking out of the
Breaking the Vehicle Over-The-Air Update System Learn more and Apply Sat, Jul 6 2024 Internship connected vehicles autonomous vehicles software updates cybersecurity distributed systems vehicle communications Over-the-Air A modern vehicle is composed of around 100 Electronic Control Unit (ECU) connected via several types of networks. An ECU is an embedded device, similar to a RaspberryPI, running an operating system, e.g., Linux-based or real-time OS, on top of which different software and firmware may run, depending on the application. Due to the imperfection of humans, software can have faults and vulnerabilities, which can lead to catastrophic failures that threatens human lives. This makes the manufacturers liable to such failures and thus often caused millions of vehicles recalls for repair. A smart
Advanced Breach and Attack Simulation using ML Learn more and Apply Sat, Jul 6 2024 Internship cybersecurity machine learning deep learning penetration testing threat modeling Generative Adversarial Networks GaN Cybersecurity is becoming a need more than ever. Organizations need to protect their digital assets and are required to earn certifications to prove the compliance to the regulations and rules. For this, these assets must be assessed to ensure the target security posture and to get certified or pass an audit on yearly basis. This is a daunting and costly task as it often requires a third-party tester that tries to penetrate the system, under agreement. Breach and Attack Simulation is a new method that allows to do this penetration testing in-house, using some automation tools. Some of these