Publications



[Google Scholar] , [DBLP]

    2017

  • IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks
    Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash
    [arXiv]
  • Robust Physical-World Attacks on Deep Learning Models
    Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song (alphabetical order)
    [arXiv] [IEEE Spectrum] [Yahoo News] [Wired] [Engagdet] [Telegraph] [Car and Driver] [CNET] [Digital Trends] [SCMagazine] [Schneier on Security] [Ars Technica] [Fortune]
  • Securing Trigger-Action Platforms
    Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash
    In 2017 USENIX Summit on Hot Topics in Security (HotSec'17)
    [Venue]
  • Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things
    Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash
    [arXiv]
  • Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
    Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash
    In IEEE Security & Privacy: Systems Attacks and Defenses, July 2017
    [Paper] [arXiv] [Venue]
  • Support for Security and Safety of Programmable IoT Systems
    Alex Gyori, Earlence Fernandes, Amir Rahmati, Atul Prakash, Darko Marinov
    In ISSTA 2017 Workshop on Testing Embedded and Cyber-Physical Systems (TECPS 2017)
    [Venue]
  • Heimdall: A Privacy-Respecting Implicit Preference Collection Framework
    Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Xinheng Chen, Atul Prakash
    In the 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys'17).
    [Paper] [1-Min Video] [Venue]
  • The Security Implications of Permission Models of Smart Home Application Frameworks
    Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash
    IEEE Security & Privacy, Volume 15, Issue 2, April 2017.
    [Paper] [Venue]
  • ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms
    Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, AtulPrakash
    In Proceedings of the 21st Network and Distributed System Security Symposium (NDSS’17).
    [Paper] [Slides] [Venue]
  • 2016

  • Towards Comprehensive Repositories of Opinions
    Han Zhang, Kasra Edalat Nejad, Amir Rahmati, Harsha V. Madhyastha
    In 15th ACM Workshop on Hot Topics in Networks (HotNets'16).
    [Paper] [Venue]
  • Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications
    Amir Rahmati, Earlence Fernandes, and Atul Prakash
    In Proceedings of the 1st IEEE Cybersecurity Development Conference (SecDev’16).
    [Paper] [Venue]
  • FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
    Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash
    In Proceedings of the 25th USENIX Security Symposium (USENIX Sec’16).
    [Paper] [Slides] [Venue]
  • Approximate Flash Storage: A Feasibility Study
    Amir Rahmati, Matthew Hicks, and Atul Prakash
    In the Workshop on Approximate Computing Across the System Stack (WAX’16).
    [Paper] [Slides] [Code] [Venue]
  • Persistent Clocks for Batteryless Sensing Devices
    Josiah Hester, Nicole Tobias, Amir Rahmati, Lanny Sitanayah, Dan Holcomb, Kevin Fu, Wayne Burleson, Jacob Sorber
    In Transactions on Embedded Computing Systems (TECS'16).
    [Paper] [Venue]
  • 2015

  • Context-Specific Access Control: Conforming Permissions With User Expectations
    Amir Rahmati, Harsha V. Madhyastha
    In 5th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'15).
    [Paper] [Slides] [Venue]
  • Probable Cause: The Deanonymizing Effects of Approximate DRAM
    Amir Rahmati, Matthew Hicks, Daniel Holcomb, Kevin Fu
    In 42nd International Symposium on Computer Architecture (ISCA'15)
    [Paper] [Slides] [Venue]
  • 2014

  • Malware Prognosis: How to Do Malware Research in Medical Domain
    Sai R. Gouravajhala, Amir Rahmati, Peter Honeyman, and Kevin Fu
    In USENIX Workshop on Health Information Technologies (Health Tech’14)
    [Paper] [Slides] [Venue]
  • Reliable Physical Unclonable Functions using Data Retention Voltage of SRAM Cells
    Xiaolin Xu, Amir Rahmati, Daniel Holcomb, Kevin Fu, Wayne Burleson
    In IEEE Transactions on CAD: Special Section on Hardware Security and Trust (TCAD)
    [Paper] [Venue]
  • Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain
    Sai R. Gouravajhala, Amir Rahmati, Evan Chavis, Denis Foo Kune, Peter Honeyman, Michael Bailey, Kevin Fu
    In Poster session of 35rd Annual IEEE Symposium on Security and Privacy (IEEE S&P)
    [Venue]
  • Refreshing Thoughts on DRAM: Power Saving vs. Data Integrity
    Amir Rahmati, Matthew Hicks, Daniel Holcomb, Kevin Fu
    In the Workshop on Approximate Computing Across the System Stack (WACAS’14)
    [Paper] [Slides] [Venue]
  • 2013

  • Under What Circumstances Are Insider Leaks Justified?
    Ben Lusher, Kathryn Reeves, Amir Rahmati
    Cyber Conflict Report
    [Paper] [Slides] [Venue]
  • Cyber Dimensions of State Repression
    Meredith Blank, Anita Ravishankar, Amir Rahmati
    Cyber Conflict Report
    [Paper] [Slides] [Venue]
  • WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices
    Shane Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, Kevin Fu
    In USENIX Workshop on Health Information Technologies (Health Tech’13)
    [Paper] [Venue] [MIT Tech Review]
  • 2012

  • TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks
    Amir Rahmati, Mastooreh Salajegheh, Daniel Holcomb, Jacob Sorber, Wayne Burleson, Kevin Fu
    In Proceedings of the 21st USENIX Security Symposium (USENIX Sec’12)
    [Paper] [Slides] [Video] [Venue] [Microsoft Research] [IEEE Spectrum] [Slashdot]
  • DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification
    Daniel Holcomb, Amir Rahmati, Mastooreh Salajegheh,Wayne Burleson, Kevin Fu
    In The 8th Workshop On RFID Security And Privacy 2012 (RFIDsec’12)
    [Paper] [Slides] [Slides #2] [Venue]
  • TARDIS: Secure Time Keeping For Embedded Devices Without Clocks
    Amir Rahmati, Mastooreh Salajegheh, Daniel Holcomb, Jacob Sorber, Wayne Burleson, Kevin Fu
    In Poster and Short Talk session of 33rd Annual IEEE Symposium on Security and Privacy (IEEE S&P)
    [Paper] [Slides] [Poster] [Venue]