Yanjun Pan (University of Arizona)

In this talk, we will explore the experimental approach for our paper "PoF: Proof-of-Following for Vehicle Platoons" that appears in NDSS 2022. We will present our initial research hypothesis on the temporal and spatial correlation of ambient RF signals due to large-scale fading and the use of the RF correlation to derive security in the context of vehicle platooning. We will describe the set of experiments that were designed to test our hypothesis in different settings (highway, urban environment, static setting, indoor setting). We will present the testbed iterations (RF testbed plus platooning testbed) to collect the desired measurements and the calibration and analysis of those measurements to validate the initial hypothesis. Further, we will share the challenges and useful experiences gained during the experimentation process and note the lesson learned for future experimental efforts.

Speaker's biography

Yanjun Pan is an assistant professor in the Department of Computer Science and Computer Engineering at the University of Arkansas. Her research interests include wireless security, wireless sensing, and network optimization, with emphases on physical layer security, mmWave sensing, and cross-layer network optimization. She holds a Ph.D. in Electrical and Computer Engineering from the University of Arizona and is a recipient of the 2021 N2Women Young Researcher Fellowship.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 42 [1] => 55 ) ) ) [post__not_in] => Array ( [0] => 8411 ) )

EMS: History-Driven Mutation for Coverage-based Fuzzing

Chenyang Lyu (Zhejiang University), Shouling Ji (Zhejiang University), Xuhong Zhang (Zhejiang University & Zhejiang University NGICS Platform), Hong Liang (Zhejiang University), Binbin Zhao (Georgia Institute of Technology), Kangjie Lu (University of Minnesota), Raheem Beyah (Georgia Institute of Technology)

Read More

Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures

Huibo Wang (Baidu Security), Guoxing Chen (Shanghai Jiao Tong University), Yinqian Zhang (Southern University of Science and Technology), Zhiqiang Lin (Ohio State University)

Read More

datAFLow: Towards a Data-Flow-Guided Fuzzer

Adrian Herrera (Australian National University), Mathias Payer (EPFL), Antony Hosking (Australian National University)

Read More

Remote Memory-Deduplication Attacks

Martin Schwarzl (Graz University of Technology), Erik Kraft (Graz University of Technology), Moritz Lipp (Graz University of Technology), Daniel Gruss (Graz University of Technology)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)