Finding Free Bytes for Security
October 11, 2018 | Duke UniversityEstimated reading time: 3 minutes

From your watch to your refrigerator to your dog, it’s becoming increasingly difficult to find much of anything in the modern world that does not have some sort of sensor or microprocessor embedded into it. Even people, with medical technology like pacemakers and neural stimulators, are becoming part of the Internet of Things.
This level of digital interconnectedness isn’t just making life easier for people using these futuristic devices, it’s also making life easier for hackers. For every new subsystem integrated into an autonomous vehicle, for example, there’s a new route to attack its central computing functions.
Miroslav Pajic, the Nortel Networks Assistant Professor of Electrical and Computer Engineering at Duke University, has been working to secure such systems through a project jointly funded by Intel and the National Science Foundation (NSF). His goal is to secure the complex integrated systems that interact with the physical world around us in a way that does not diminish performance or increase costs.
Pajic’s approach takes advantage of a device’s interactions with its physical environment to detect attacks and provide resiliency against them. Returning to the example of driverless cars, a digital assailant could compromise the GPS to take the vehicle off course. But by using additional sensors, Pajic and his team showed that the car will be able to recognize the false data, and act accordingly.
Adding complexity to these efforts of securing modern vehicles with varying levels of autonomy, is the computational and communication limits of a car’s electronics. Consumers don’t want to pay the added price for extra CPUs or faster communication networks, nor do they want to sacrifice their car’s performance to allow it to execute these security-related algorithms. The second half of Pajic’s work, then, is to find ways to slip these processes in to the car’s existing moments of computational and communication downtime.
“Most of the cost of a modern car is tied to its software,” said Pajic. “And adding significant security overheard adds too much to an already taxed system. Our goal is to find ways to utilize intermittently available open slots to piece together sufficient security protocols, in order to provide strong security guarantees without reducing the overall system performance.”
Theoretically, a car’s embedded processing system could simply encrypt every single message sent between sensors, controllers and processors, negating the need for double-checking data. But this again would take up too much processing power. Another solution Pajic is pursuing is to encrypt only a certain number of messages—every fifth one, for example—and then find space in the existing programming to carry out the spaced-out encryptions and decryptions.
Pajic has received national attention for both of these approaches. Besides earning an Early Career Award from the NSF and a Young Investigator Award from the ONR to pursue these topics, his initial work on embedding security control tasks into existing computational downtime won the Best Paper Award at the 17th Association for Computing Machinery SIGBED International Conference on Embedded Software (EMSOFT) held in the fall of 2017.
In the paper, Pajic and his students demonstrate that these security approaches can work. As a convoy of toy cars outfitted with real automotive industry sensors and controllers race along a treadmill in a line, the communications between the middle car’s proximity sensors and speed controller is attacked.
When working normally, the system automatically keeps the cars a certain distance apart. When attacked, the controller believes the lead car is further away than it is, causing the trailing car to speed up and run into it. Unless, that is, Pajic’s software has been initiated, which thwarts the attack just enough to keep the car’s behavior in line.
The research grant supporting the work culminated this summer with a presentation on their progress to the funding agencies. Both the NSF and Intel were impressed enough to extend Pajic’s funding for an additional two years, beating out several other projects in the initial program.
“Attackers have shown the ability to cut an entire nation’s power for days and wreak havoc on companies and government agencies,” said Pajic, referring to several notable cyberattacks carried out against Ukraine in the past several years. “These types of security protocols aren’t just relegated to the road. They’re applicable to all kinds of networked devices, autonomous vehicles and infrastructure. And it’s essential that we stay ahead of bad actors no matter their intent or location.”
Suggested Items
Indium’s Karthik Vijay to Present on Dual Alloy Solder Paste Systems at SMTA’s Electronics in Harsh Environments Conference
05/06/2025 | Indium CorporationIndium Corporation Technical Manager, Europe, Africa, and the Middle East Karthik Vijay will deliver a technical presentation on dual alloy solder paste systems at SMTA’s Electronics in Harsh Environments Conference, May 20-22 in Amsterdam, Netherlands.
From Execution to Intelligence: A Data-driven Approach to Modern Manufacturing
05/06/2025 | Barry Matties, I-Connect007In this discussion, Augusto Vilarinho, an MES expert at Critical Manufacturing, explores the essential functions of MES in tracking and tracing shop floor activities where AI and machine learning capabilities are purposely built into the MES through it's embedded data platform, capturing all machine data, integrating and connecting with different systems, ERPs, physical equipment, and people.
Baker Hughes' Waygate Unveils Nanotom HR for Advanced Inspection
05/06/2025 | Baker HughesWaygate Technologies, a Baker Hughes business and global leader in nondestructive testing (NDT) solutions for industrial inspection, unveiled its new extremely high-resolution computed tomography (CT) system, Phoenix Nanotom® HR (High Resolution) at the Control 2025 show in Stuttgart, Germany.
Northrop Grumman’s IVEWS Completes F-16 Electronic Warfare Operational Assessment
05/05/2025 | Northrop GrummanNorthrop Grumman Corporation’s IVEWS (Integrated Viper Electronic Warfare Suite) has successfully completed Operational Assessment flight testing on U.S. Air Force F-16 aircraft, demonstrating its effectiveness against advanced radar-guided threats.
INVISIO Further Expands Capability of Market-Leading Wireless Intercom System
05/05/2025 | INVISIOTactical communications expert INVISIO is expanding the capability of its market-leading intercom system made for tailored user and radio communication. The expansion will deliver enhanced mobility, flexibility, interoperability and functionality for mission-critical users.