Publications

(2020). Can Attention Masks Improve Adversarial Robustness?. In The AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS).

PDF Venue

(2017). Securing Trigger-Action Platforms. In USENIX Summit on Hot Topics in Security (HotSec).

Slides Venue

(2017). Support for Security and Safety of Programmable IoT Systems. In ISSTA Workshop on Testing Embedded and Cyber-Physical Systems (TECPS).

Venue

(2016). Towards Comprehensive Repositories of Opinions. In ACM Workshop on Hot Topics in Networks (HotNets).

PDF Venue

(2016). Approximate Flash Storage: A Feasibility Study. In Workshop on Approximate Computing Across the Stack (WAX).

PDF Code Slides Venue

(2015). Context-Specific Access Control: Conforming Permissions With User Expectations. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM).

PDF Slides Venue

(2014). Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain. In Poster and Short Talk session of IEEE Symposium on Security and Privacy (IEEE S&P).

Venue

(2014). Malware Prognosis: How to Do Malware Research in Medical Domain. In USENIX Workshop on Health Information Technologies (Health Tech).

PDF Slides Venue

(2014). Reliable Physical Unclonable Functions using Data Retention Voltage of SRAM Cells. In IEEE Transactions on CAD: Special Section on Hardware Security and Trust (TCAD).

PDF Venue

(2014). Refreshing Thoughts on DRAM: Power Saving vs. Data Integrity. In Workshop on Approximate Computing Across the System Stack (WACAS).

PDF Slides Venue