Paul Agbaje, Abraham Mookhoek, Afia Anjum, Arkajyoti Mitra (University of Texas at Arlington), Mert D. Pesé (Clemson University), Habeeb Olufowobi (University of Texas at Arlington)

Millions of lives are lost due to road accidents each year, emphasizing the importance of improving driver safety measures. In addition, physical vehicle security is a persistent challenge exacerbated by the growing interconnectivity of vehicles, allowing adversaries to engage in vehicle theft and compromising driver privacy. The integration of advanced sensors with internet connectivity has ushered in the era of intelligent transportation systems (ITS), enabling vehicles to generate abundant data that facilitates diverse vehicular applications. These data can also provide insights into driver behavior, enabling effective driver monitoring to support safety and security. In this paper, we propose AutoWatch, a graph-based approach for modeling the behavior of drivers, verifying the identity of the driver, and detecting unsafe driving maneuvers. Our evaluation shows that AutoWatch can improve driver identification accuracy by up to 22% and driving maneuver classification by up to 5.7% compared to baseline techniques.

View More Papers

Enhanced Vehicular Roll-Jam Attack using a Known Noise Source

Zachary Depp, Halit Bugra Tulay, C. Emre Koksal (The Ohio State University)

Read More

MirageFlow: A New Bandwidth Inflation Attack on Tor

Christoph Sendner (University of Würzburg), Jasper Stang (University of Würzburg), Alexandra Dmitrienko (University of Würzburg), Raveen Wijewickrama (University of Texas at San Antonio), Murtuza Jadliwala (University of Texas at San Antonio)

Read More

Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor...

Fannv He (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Yan Jia (DISSec, College of Cyber Science, Nankai University, China), Jiayu Zhao (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Yue Fang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China),…

Read More

Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio...

Rui Duan (University of South Florida), Zhe Qu (Central South University), Leah Ding (American University), Yao Liu (University of South Florida), Zhuo Lu (University of South Florida)

Read More