AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance

AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance,
Tianyuan Liu, Avesta Hojjati, Adam Bates, and Klara Nahrstedt.
IEEE ICDCS 2018, 38th IEEE International Conference on Distributed Computing Systems, July 2018, Vienna, Austria.

Last updated on Sunday, December 9, 2018, 8:48 am

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling,
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili.
The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP 2017), Columbus, NY, November 2017.

Last updated on Friday, December 29, 2017, 1:05 pm

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX,
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’17), October, 2017.

Last updated on Saturday, October 14, 2017, 12:50 pm

Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises

Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises,
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov.
Research in Attacks, Intrusions and Defenses (RAID ’17), Atlanta, GA, September, 2017.

Last updated on Saturday, December 2, 2017, 4:37 pm

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps,
Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter.
Annual Computer Security Applications Conference (ACSAC ’17), December, 2017.

Last updated on Sunday, November 5, 2017, 8:57 pm

CamForensics: Understanding Visual Privacy Leaks in the Wild

CamForensics: Understanding Visual Privacy Leaks in the Wild,
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon Cox, Kyu-Han Kim.
ACM Embedded Networked Sensor Systems (SenSys ’17), November 2017.


Last updated on Sunday, May 23, 2021, 9:13 am

Plausible Deniability for Privacy-Preserving Data Synthesis

Plausible Deniability for Privacy-Preserving Data Synthesis
Vincent Bindschaedler, Reza Shokri, Carl A. Gunter.
VLDB Endowment International Conference on Very Large Data Bases (VLDB ’17), Munich, Germany, August 28, 2017.

Last updated on Sunday, November 5, 2017, 8:59 pm

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.

HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps,
Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace.
ACM Security and Wireless and Mobile Networks (WiSec ’17), Boston, MA, July 2017. [PPT]


Last updated on Wednesday, May 26, 2021, 8:11 am

VISUALIZATION AND DIFFERENTIAL PRIVACY

Visualization and Differential Privacy,
Hyun Bin Lee.
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2017.

Last updated on Sunday, August 6, 2017, 2:36 pm

LSTM AND EXTENDED DEAD RECKONING AUTOMOBILE ROUTE PREDICTION USING SMARTPHONE SENSORS

LSTM and Extended Dead Reckoning Automobile Route Prediction Using Smartphone Sensors,
Ryan Freedman,
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2017.

Last updated on Sunday, August 6, 2017, 2:32 pm