Collaborative Research: CISE MSI: RPEP: OAC: Macroscopic and Microscopic Inference and Analysis of Vulnerabilities within EV Charging-Management Systems

Information

  • NSF Award
  • 2431614
Owner
  • Award Id
    2431614
  • Award Effective Date
    10/1/2024 - 4 months ago
  • Award Expiration Date
    9/30/2028 - 3 years from now
  • Award Amount
    $ 280,000.00
  • Award Instrument
    Standard Grant

Collaborative Research: CISE MSI: RPEP: OAC: Macroscopic and Microscopic Inference and Analysis of Vulnerabilities within EV Charging-Management Systems

The United States (U.S.) transportation sector remains a cornerstone of the economy, contributing over 8% to the country's Gross Domestic Product (GDP). Electrification efforts are transforming this sector, aiming to enhance mobility efficiency, reduce operating and maintenance costs, and cut greenhouse gas emissions. These efforts also seek to boost energy independence and security while significantly contributing to employment, particularly in technology and innovation fields. This shift has already placed more than 2.5 million Electric Vehicles (EVs) on U.S. roads, supported by over 70 thousand charging stations nationwide. To manage this advanced and complex cyberinfrastructure (CI), EV operators and vendors rely on cloud-based EV Management Stations (EVMS), crucial for provisioning services such as charging, billing, and authentication. However, the critical nature of EVMS has made them targets for malicious attacks, often state-sponsored, exploiting rarely investigated vulnerabilities. In response, this project establishes a collaborative ecosystem among academia, industry, and the public sector to bolster the resilience of the EV CI. It aims to develop proactive methodologies to identify and analyze Internet-connected EVMS and their software, thoroughly exploring and mitigating related vulnerabilities. This initiative connects several diverse Minority Serving Institutions (MSIs) within the established ecosystem, fostering joint research and providing enriching training opportunities. Through workshops, capstones, curricula material, virtual hands-on labs, professional development, and mentorship programs, the project enhances cross-disciplinary capacities at MSIs and beyond, driving forward the future of resilient, electrified transportation. In this context, this project serves NSF's mission in promoting the progress of science and securing national defense related to this ever-evolving CI.<br/> <br/> <br/>The project pioneers advanced fingerprinting techniques employing automated web scraping, recursive unsupervised learning algorithms, and pattern matching methodologies to identify and cluster Internet-scale EVMS. The primary objective is to detect deployed configurations and their interconnections, while retrieving critical artifacts, such as firmware binaries and compiled software, for comprehensive vulnerability analysis and disclosure. Leveraging robust industry connections, the project acquires auxiliary artifacts, including EVMS source code, through advanced supply chain reconnaissance and reverse engineering methods. This initiative also devises and implements an advanced digital forensic methodology rooted in ensemble techniques and machine learning classifiers. It integrates static analysis, file system forensics, memory forensics using volatility frameworks, data carving with custom heuristics, offensive security tactics, behavioral analysis through dynamic instrumentation, and virtualization methodologies such as hypervisor introspection to meticulously analyze the security posture of EVMS firmware and web endpoints. Furthermore, the project exploits state-of-the-art innovations in Large Language Models (LLMs) to automatically identify vulnerabilities in EVMS source code and suggest tailored and sound code fixes. This is accomplished by creating an unprecedented instruction-based training dataset using supervised fine-tuning, reinforcement learning, and transfer learning techniques. Additionally, the project establishes a large-scale data and threat repository to index discovered threat models, associated vulnerabilities, and retrieved EVMS artifacts. Accessible via RESTful APIs and web-based interfaces, this repository democratizes knowledge by making the harvested EVMS assets available at large, significantly empowering EVMS-centric threat situational awareness while fostering advanced research and development.<br/><br/>This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

  • Program Officer
    Sharmistha Bagchi-Senshabagch@nsf.gov7032928104
  • Min Amd Letter Date
    8/1/2024 - 6 months ago
  • Max Amd Letter Date
    8/1/2024 - 6 months ago
  • ARRA Amount

Institutions

  • Name
    Southern University
  • City
    BATON ROUGE
  • State
    LA
  • Country
    United States
  • Address
    730 HARDING BLVD
  • Postal Code
    708075304
  • Phone Number
    2257712809

Investigators

  • First Name
    Sudhir
  • Last Name
    Trivedi
  • Email Address
    sudhir_trivedi@subr.edu
  • Start Date
    8/1/2024 12:00:00 AM
  • First Name
    Krutthika
  • Last Name
    Hirebasur Krishnappa
  • Email Address
    krutthika.hirebas@sus.edu
  • Start Date
    8/1/2024 12:00:00 AM

Program Element

  • Text
    CISE MSI Research Expansion

Program Reference

  • Text
    CISE MSI Research Expansion
  • Text
    CYBERINFRASTRUCTURE
  • Code
    7231
  • Text
    WOMEN, MINORITY, DISABLED, NEC
  • Code
    9102
  • Text
    EXP PROG TO STIM COMP RES
  • Code
    9150