Peter J. Hawrylak

Learn More
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based(More)
While RFID is starting to become a ubiquitious technology, the variation between different RFID systems still remains high. This paper presents several prototyping environments for different components of radio frequency identification (RFID) tags to demonstrate how many of these components can be standardized for many different purposes. We include two(More)
This paper describes the Passive Active RFID Tag (PART). The first innovation is an automated method to generate RFID tag controllers based on high-level descriptions of a customised set of RFID primitives. We are capable of targeting microprocessor-based or custom hardware-based controllers. The second innovation is a passive burst switch front-end to the(More)
This extended abstract presents a set of continuous-domain extensions to the attack graph, a formalism used to model the interactions of multiple exploits and assets in a network. These extensions result in a new modeling framework called the hybrid attack dependency graph, which provides the novel capability of modeling continuous state variables and their(More)
Extremely resilient actuators can built by collecting force-generating, computational, and sensing modules together to fit into the allotted volume. Including extra modules makes the actuator damage tolerant. This modular architecture allows an actuator at any performance point to be easily synthesized from a small number of component parts. The embedded(More)
This chapter describes how to use attack graphs to evaluate the security vulnerabilities of an embedded computer network and provides example cases of this technique. Attack graphs are powerful tools available to system administrators to identify and manage vulnerabilities. Attack graphs describe the steps an adversary could take to reach a desired goal and(More)