Practical DoS attacks on embedded networks in commercial vehicles S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble Information Systems Security: 12th International Conference, ICISS 2016 …, 2016 | 74 | 2016 |
Automated extraction of vulnerability information for home computer security S Weerawardhana, S Mukherjee, I Ray, A Howe Foundations and Practice of Security: 7th International Symposium, FPS 2014 …, 2015 | 50 | 2015 |
Attribute Based Access Control for Healthcare Resources S Mukherjee, I Ray, I Ray, H Shirazi, T Ong, MG Kahn Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 29-40, 2017 | 29 | 2017 |
An efficient implementation of next generation access control for the mobile health cloud R Basnet, S Mukherjee, VM Pagadala, I Ray 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC …, 2018 | 24 | 2018 |
Towards a cyber assurance testbed for heavy vehicle electronic controls J Daily, R Gamble, S Moffitt, C Raines The Best of COMVEC 2016 Select Technical Papers from the SAE Commercial …, 2016 | 20 | 2016 |
A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks S Mukherjee, J Walker, I Ray, J Daily Proceedings of the 15th International Conference on Privacy, Security and …, 2017 | 15 | 2017 |
Exploiting transport protocol vulnerabilities in SAE J1939 networks R Chatterjee, S Mukherjee, J Daily Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2023 | 7 | 2023 |
Real-Time Network Defense of SAE J1939 Address Claim Attacks MT Campo, S Mukherjee, J Daily SAE International Journal of Commercial Vehicles 14 (02-14-03-0026), 319-328, 2021 | 7 | 2021 |
Truckstm: Runtime realization of operational state transitions for medium and heavy duty vehicles S Mukherjee, JC Van Etten, NR Samyukta, J Walker, I Ray, I Ray ACM Transactions on Cyber-Physical Systems 4 (1), 1-25, 2019 | 4 | 2019 |
SAE J1939-specific cyber security for medium and heavy-duty vehicles S Mukherjee Colorado State University, 2023 | 3 | 2023 |
A heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions S Mukherjee Colorado State University, 2017 | 3 | 2017 |
CANLay: A Network Virtualized Testbed for Vehicle Systems–Improving System Integration and Verification Efforts J Jepson, S Mukherjee, M Span, J Daily INCOSE International Symposium 33 (1), 1-16, 2023 | 2 | 2023 |
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles S Mukherjee, N Cain, J Walker, D White, I Ray, I Ray Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 2 | 2017 |
Towards a Software Defined Truck S Mukherjee, J Daily INCOSE International Symposium 31 (1), 1019-1034, 2021 | 1 | 2021 |
Method and system for detecting intrusion in a vehicle system SK Kumar, S Mukherjee, H Bishop, CS York, AT Hillery US Patent WO2020232147A1, 2020 | | 2020 |
In-ComVec Sec: in-vehicle security for medium and heavy duty vehicles S Mukherjee Colorado State University. Libraries, 2017 | | 2017 |
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations S Mukherjee, S Weerawardhana, C Dunn, I Ray, A Howe Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | | 2015 |
Transport Layer Vulnerabilities in the SAE J1939 Protocol-Request Overload R Chatterjee, S Mukherjee, J Daily | | |