- Browse by Author
Browsing by Author "Shankar Kumar, Valli Sanghami"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Intersection Collision Avoidance For Autonomous Vehicles Using Petri Nets(2019-08) Shankar Kumar, Valli Sanghami; Li, Lingxi; Chen, Yaobin; King, BrianAutonomous vehicles currently dominate the automobile field for their impact on humanity and society. Connected and Automated Vehicles (CAV’s) are vehicles that use different communication technologies to communicate with other vehicles, infrastructure, the cloud, etc. With the information received from the sensors present, the vehicles analyze and take necessary steps for smooth, collision-free driving. This the sis talks about the cruise control system along with the intersection collision avoidance system based on Petri net models. It consists of two internal controllers for velocity and distance control, respectively, and three external ones for collision avoidance. Fault-tolerant redundant controllers are designed to keep these three controllers in check. The model is built using a PN toolbox and tested for various scenarios. The model is also validated, and its distinct properties are analyzed.Item Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED(Springer, 2022-03) Miles, Samuel; McDonough, Corey; Michael, Emmanuel Obichukwu; Shankar Kumar, Valli Sanghami; Lee, John J.; Electrical and Computer Engineering, School of Engineering and TechnologyThis paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.