Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christopher J. Stull is active.

Publication


Featured researches published by Christopher J. Stull.


Proceedings of SPIE | 2013

A preliminary cyber-physical security assessment of the Robot Operating System (ROS)

Jarrod McClean; Christopher J. Stull; Charles R Farrar; David Mascareñas

Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: “What prevents ROS from being used in commercial or government applications?” One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security “honeypot” running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: “What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?” This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.


Journal of Applied Mechanics | 2013

A Local Material Basis Solution Approach to Reconstructing the Three-Dimensional Displacement of Rod-Like Structures From Strain Measurements

Michael D. Todd; Christopher J. Stull; Michael Dickerson

This paper presents a new approach for determining three-dimensional global displacement (for arbitrarily sized deformation) of thin rod or tetherlike structures from a limited set of scalar strain measurements. The approach is rooted in Cosserat rod theory with a material-adapted reference frame and a localized linearization approach that facilitates an exact local basis function set for the displacement along with the material frame. The solution set is shown to be robust to potential singularities from vanishing bending and twisting angle derivatives and from vanishing measured strain. Validation of the approach is performed through a comparison with both finite element simulations and an experiment, with average root mean square reconstruction error of 0.01%‐1% of the total length, for reasonable sensor counts. An analysis of error due to extraneous noise sources and boundary condition uncertainty shows how the error scales with those effects. The algorithm involves relatively simple operations, the most complex of which is square matrix inversion, lending itself to potential low-power embeddable solutions for applications requiring shape reconstruction. [DOI: 10.1115/1.4023023]


Structural Health Monitoring-an International Journal | 2012

On Assessing the Robustness of Structural Health Monitoring Technologies

Christopher J. Stull; François M. Hemez; Charles R Farrar

As Structural Health Monitoring (SHM) continues to gain popularity, both as an area of research and as a tool for use in industrial applications, the number of technologies associated with SHM will also continue to grow. As a result, the engineer tasked with developing a SHM system is faced with myriad hardware and software technologies from which to choose, often adopting an ad hoc qualitative approach based on physical intuition or past experience to making such decisions, and offering little in the way of justification for a particular decision. The present paper offers a framework that aims to provide the engineer with a qualitative approach for choosing from among a suite of candidate SHM technologies. The framework is outlined for the general case, where a supervised learning approach to SHM is adopted, and is then demonstrated on a problem commonly encountered when developing SHM systems: selection of a damage classifier, where the engineer must select from among a suite of candidate classifiers, the one most appropriate for the task at hand. The data employed for these problems are taken from a preliminary study that examined the feasibility of applying SHM technologies to the RAPid Telescopes for Optical Response observatory network. (Approved for unlimited public release on September 20, 2011, LA-UR 11-05398, Unclassified)


Archive | 2013

Analysis and Dynamic Characterization of a Resonant Plate for Shock Testing

Richard Hsieh; R. Max Moore; Sydney Sroka; James Lake; Christopher J. Stull; Peter Avitabile

Satellite hardware subjected to pyroshock events during launch must pass one or more qualification tests to ensure proper function during operation in space. This research involves the dynamic characterization of a resonant plate that is used to perform qualification tests. The goal is to develop an analytical model that accurately predicts the shock response spectra (SRS) for a variety of configurations of the resonate plate. Experimental shock data is collected to analyze the system’s variability. Experimental modal tests are performed to determine the system’s mode shapes, natural frequencies, and damping. A finite element model is constructed to predict higher frequency mode shapes for use in the analytical model. The modal superposition technique is then employed to solve for acceleration time responses at specific locations on the plate which allow for the calculation of SRS at each point. The paper concludes by discussing multiple case studies that analyze the effects of key parameters on the analytical model’s predicted SRS.


Journal of Structural Engineering-asce | 2013

Real-time condition assessment of RAPTOR telescope systems

Christopher J. Stull; Stuart G. Taylor; James A. Wren; David L. Mascareñas; Charles R Farrar

AbstractThe RAPid Telescopes for Optical Response (RAPTOR) observatory network consists of several ground-based, autonomous, robotic, astronomical observatories primarily designed to search for astrophysical transients called gamma-ray bursts. To make these observations, however, the RAPTOR telescopes must remain in peak operating condition at a high duty-cycle. Currently, the telescopes are maintained in an ad hoc manner, often in a run-to-failure mode. The required maintenance logistics are further complicated by the fact that many of the observatories are situated in remote locations. To ameliorate this situation, an effort has been initiated to develop a structural health monitoring (SHM) system capable of real-time, remote assessment of the RAPTOR telescopes. This paper summarizes the results from that effort. Common damage scenarios are identified to guide the instrumentation of the telescope system. A comprehensive analysis of the data acquired during experimental testing is then presented, highlig...


Proceedings of SPIE | 2013

A locally exact strain-to-displacement approach for shape reconstruction of slender objects using fiber Bragg gratings

Michael D. Todd; Christopher J. Stull; Mike Dickerson

This paper presents an algorithm for determining three-dimensional displacement of thin rod- or tether-like structures from a set of scalar strain measurements, for arbitrarily large deformations. The approach employs a material-adapted reference frame and a local linearization approach that results in an exact local basis function set for the displacement and for the material frame evolution. The basis set is shown to be robust to potential singularities from vanishing bending and twisting angle derivatives and from vanishing measured strain. Validation of the approach is performed through comparison with both finite element simulations and an experiment, with average root mean square reconstruction error of 0.01%-1% of the total length depending upon the number of sensors used. Analysis of error due to extraneous noise sources and boundary condition uncertainty shows how error propagates under those effects. (Approved for release: LA-UR-13-21066)


Proceedings of SPIE | 2011

Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

David Mascareñas; Christopher J. Stull; Charles R Farrar

In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.


Proceedings of SPIE | 2012

Development of an info-gap-based path planner to enable nondeterministic low-observability mobile sensor nodes

David Mascareñas; Christopher J. Stull; Charles R Farrar

Mobile sensor nodes are an ideal solution for efficiently collecting measurements for a variety of applications. Mobile sensor nodes offer a particular advantage when measurements must be made in hazardous and/or adversarial environments. When mobile sensor nodes must operate in hostile environments, it would be advantageous for them to be able to avoid undesired interactions with hostile elements. It is also of interest for the mobile sensor node to maintain low-observability in order to avoid detection by hostile elements. Conventional path-planning strategies typically attempt to plan a path by optimizing some performance metric. The problem with this approach in an adversarial environment is that it may be relatively simple for a hostile element to anticipate the mobile sensor nodes actions (i.e. optimal paths are also often predictable paths). Such information could then be leveraged to exploit the mobile sensor node. Furthermore, dynamic adversarial environments are typically characterized by high-uncertainty and highcomplexity that can make synthesizing paths featuring adequate performance very difficult. The goal of this work is to develop a path-planner anchored in info-gap decision theory, capable of generating non-deterministic paths that satisfy predetermined performance requirements in the face of uncertainty surrounding the actions of the hostile element(s) and/or the environment. This type of path-planner will inherently make use of the time-tested security technique of varying paths and changing routines while taking into account the current state estimate of the environment and the uncertainties associated with it.


Unmanned/Unattended Sensors and Sensor Networks VIII | 2011

Towards the development of tamper-resistant, ground-based mobile sensor nodes

David Mascareñas; Christopher J. Stull; Charles R Farrar

Mobile sensor nodes hold great potential for collecting field data using fewer resources than human operators would require and potentially requiring fewer sensors than a fixed-position sensor array. It would be very beneficial to allow these mobile sensor nodes to operate unattended with a minimum of human intervention. In order to allow mobile sensor nodes to operate unattended in a field environment, it is imperative that they be capable of identifying and responding to external agents that may attempt to tamper with, damage or steal the mobile sensor nodes, while still performing their data collection mission. Potentially hostile external agents could include animals, other mobile sensor nodes, or humans. This work will focus on developing control policies to help enable a mobile sensor node to identify and avoid capture by a hostile un-mounted human. The work is developed in a simulation environment, and demonstrated using a non-holonomic, ground-based mobile sensor node. This work will be a preliminary step toward ensuring the cyber-physical security of ground-based mobile sensor nodes that operate unattended in potentially unfriendly environments.


Archive | 2013

Optimal Inequalities to Bound a Performance Probability

François M. Hemez; Christopher J. Stull

A challenging problem encountered in engineering applications is the estimation of a probability-of-failure based on incomplete knowledge of the sources of uncertainty and/or limited sampling. Theories formulated to derive upper probability bounds offer an attractive alternative because first, they avoid postulating the probability laws that are often unknown and second, they substitute numerical optimization for statistical sampling. A critical assessment of one such technique is presented. It derives upper probability bounds from the McDiarmid concentration-of-measure theory, which postulates that fluctuations of a function are more-or-less concentrated about its mean value. Two applications of this theory are presented. The first application analyzes a “toy” polynomial function defined in two dimensions. The upper bounds of probability are calculated and compared to sampling-based estimates of the true-but-unknown probabilities. For this function, the upper bounds obtained are too broad to be useful. These results are confirmed by conducting a similar analysis on a real engineering system, where upper bounds of probability associated with resonant frequencies of a structural system are estimated. A high-fidelity finite element model, previously validated using vibration measurements, is used to predict the frequencies. In this application, the uncertainty is introduced by way of material properties and the effective preload of a beam-to-column connection, modeled explicitly. These applications suggest that the theory not only leads to upper bounds that are inefficient but that can also be sub-optimal if their numerical estimation is based on too few model runs. It is concluded that this particular theory, while mathematically attractive, may not be well suited for engineering applications.

Collaboration


Dive into the Christopher J. Stull's collaboration.

Top Co-Authors

Avatar

Charles R Farrar

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Brian J. Williams

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar

David Mascareñas

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar

François M. Hemez

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Cetin Unal

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James A. Wren

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Pasquali

Sapienza University of Rome

View shared research outputs
Researchain Logo
Decentralizing Knowledge