Publications

Filter by type:

Tyche: A Risk-Based Permission Model for Smart Homes

Preprint PDF Venue

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem

PDF Venue BleepingComputer

The State of Physical Attacks on Deep Learning Systems

PDF Venue

Physical Adversarial Examples for Object Detectors

Preprint PDF Venue

Robust Physical-World Attacks on Deep Learning Visual Classification

Preprint PDF Code Poster Venue Video Video 2

Robust Physical-World Attacks on Deep Learning Visual Classification

Venue

IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks

Preprint

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework

PDF Slides Video Venue

Securing Trigger-Action Platforms

Slides Venue

Support for Security and Safety of Programmable IoT Systems

Venue

ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms

PDF Slides Venue

Towards Comprehensive Repositories of Opinions

PDF Venue

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks

PDF Slides Venue

Persistent Clocks for Batteryless Sensing Devices

PDF Venue

Malware Prognosis: How to Do Malware Research in Medical Domain

PDF Slides Venue

Reliable Physical Unclonable Functions using Data Retention Voltage of SRAM Cells

PDF Venue

Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain

Venue

Cyber Dimensions of State Repression

PDF Slides Venue

WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices

PDF Venue MIT Tech Review

TARDIS: Secure Time Keeping For Embedded Devices Without Clocks

PDF Poster Venue