Amir Rahmati
  • Bio
  • Teaching
  • Research
  • Current Students
  • Alumni
  • Prospective Students
  • Publications
  • Useful Links
  • Recent & Upcoming Talks
    • Example Talk
  • Publications
    • The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams
    • Security Analysis of RL-Based Artificial Pancreas Systems
    • Fast Koopman Surrogate Falsification using Linear Relaxations and Weights
    • Biosignal Authentication Considered Harmful Today
    • Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations
    • Falsification using Reachability of Surrogate Koopman Models
    • A Study of the Effects of Transfer Learning on Adversarial Robustness
    • Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms
    • Provable Observation Noise Robustness for Neural Network Control Systems
    • Erebus: Access Control for Augmented Reality Systems
    • Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning
    • Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs
    • Accelerating Certified Robustness Training via Knowledge Transfer
    • On the Feasibility of Compressing Certifiably Robust Neural Networks
    • Transferring Adversarial Robustness Through Robust Representation Matching
    • Ares: A System-Oriented Wargame Framework for Adversarial ML
    • Good Bot, Bad Bot: Characterizing Automated Browsing Activity
    • An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures
    • Valve: Securing Function Workflows on Serverless Computing Platforms
    • Can Attention Masks Improve Adversarial Robustness?
    • Protecting Visual Information in Augmented Reality from Malicious Application Developers
    • ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
    • The State of Physical Attacks on Deep Learning Systems
    • Physical Adversarial Examples for Object Detectors
    • Robust Physical-World Attacks on Deep Learning Visual Classification
    • Robust Physical-World Attacks on Deep Learning Visual Classification
    • Caterpillar: Iterative Concolic Execution for Stateful Programs
    • Decentralized Action Integrity for Trigger-Action IoT Platforms
    • IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks
    • Heimdall: A Privacy-Respecting Implicit Preference Collection Framework
    • Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
    • Securing Trigger-Action Platforms
    • Tyche: A Risk-Based Permission Model for Smart Homes
    • Support for Security and Safety of Programmable IoT Systems
    • The Security Implications of Permission Models of Smart Home Application Frameworks
    • ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms
    • Towards Comprehensive Repositories of Opinions
    • Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications
    • FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
    • Persistent Clocks for Batteryless Sensing Devices
    • Approximate Flash Storage: A Feasibility Study
    • Context-Specific Access Control: Conforming Permissions With User Expectations
    • Probable Cause: The Deanonymizing Effects of Approximate DRAM
    • Malware Prognosis: How to Do Malware Research in Medical Domain
    • Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain
    • Reliable Physical Unclonable Functions using Data Retention Voltage of SRAM Cells
    • Refreshing Thoughts on DRAM: Power Saving vs. Data Integrity
    • Under What Circumstances Are Insider Leaks Justified?
    • Cyber Dimensions of State Repression
    • WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices
    • DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification
    • TARDIS: Secure Time Keeping For Embedded Devices Without Clocks
    • TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks
  • Teaching
    • SBU102: Computer Security
    • CSE331: Computer Security Fundamentals
    • CSE360: Software Security
    • CSE360: Software Security
    • CSE509: System Security
    • CSE360: Software Security
    • CSE508: Network Security
    • CSE508: Network Security
    • CSE360: Software Security
    • CSE331: Computer Security Fundamentals
    • CSE508: Network Security
    • CSE508: Network Security
    • CSE588: Computer & Network Security
  • Projects
  • Blog
    • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
    • ๐Ÿง  Sharpen your thinking with a second brain
    • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
    • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
    • โœ… Manage your projects
  • Projects
    • Pandas
    • PyTorch
    • scikit-learn
  • Experience
  • Lab Members

Lab Members

Oct 24, 2023 ยท 0 min read
Last updated on Oct 24, 2023
Amir Rahmati
Authors
Amir Rahmati
Assistant Professor

← Experience Oct 24, 2023

ยฉ 2025 Amir Rahmati. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.