Detecting AI Trojans Using Meta Neural Analysis

Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li.
IEEE Security Symposium, May, 2021.

Last updated on Thursday, May 27, 2021, 5:13 pm

DOVE: A Data-Oblivious Virtual Environment

DOVE: A Data-Oblivious Virtual Environment.
Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, and Carl A. Gunter.
ISOC Network and Distributed Systems Security (NDSS) Symposium, February, 2021.
NDSS [Video]. Extended arXiv version.

Last updated on Thursday, May 27, 2021, 5:14 pm

Securing Emerging IoT Systems Through Systematic Analysis and Design

Securing Emerging IoT Systems Through Systematic Analysis and Design.
Qi Wang.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, November, 2020.

Last updated on Friday, May 28, 2021, 3:58 pm

A Pragmatic Approach to Membership Inferences on Machine Learning Models

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, and Kai Chen.
IEEE European Symposium on Security and Privacy (EuroS&P), September, 2020.

Last updated on Thursday, May 27, 2021, 5:26 pm

See No Evil: Phishing for Permissions with False Transparency

See No Evil: Phishing for Permissions with False Transparency.
Güliz Seray Tuncay, Jingyu Qian. and Carl A. Gunter.
USENIX Security Symposium, August, 2020.

Last updated on Saturday, May 22, 2021, 4:03 pm

Grand Challenges for Embedded Security Research in a Connected World

Grand Challenges for Embedded Security Research in a Connected World.
Wayne Burleson, Kevin Fu, Denise Anthony, Jorge Guajardo, Carl Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanafar, Carl Landwehr, and Susan Squires.
arXiv:2005.06585 [cs.CY], May 2020.

Last updated on Sunday, May 23, 2021, 11:13 am

Understanding and Mitigating Privacy Risk in Machine Learning Systems

Understanding and Mitigating Privacy Risk in Machine Learning Systems.
Yunhui Long.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, May, 2020.

Last updated on Friday, May 28, 2021, 3:33 pm

A Hypothesis Testing Approach to Sharing Logs with Confidence

A Hypothesis Testing Approach to Sharing Logs with Confidence,
Yunhui Long, Le Xu, and Carl A. Gunter.
ACM Conference on Data and Application Security and Privacy (CODASPY ’20), New Orleans, LA, March 2020.


Last updated on Friday, May 21, 2021, 9:54 pm

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, and Haifeng Chen.
ISOC Network and Distributed Systems Security (NDSS ’20) Symposium, February, 2020.

Last updated on Saturday, May 22, 2021, 9:32 am

WSEmail: An architecture and system for secure Internet messaging based on web services

WSEmail: An architecture and system for secure Internet messaging based on web services.
Michael J. May, Kevin D. Lux, and Carl A. Gunter.
Service Oriented Computing and Applications (2020) 14:5–17.

Last updated on Saturday, May 22, 2021, 11:46 am