Detecting AI Trojans Using Meta Neural Analysis

Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li.
IEEE Security Symposium, May, 2021.

Last updated on Thursday, May 27, 2021, 5:13 pm

DOVE: A Data-Oblivious Virtual Environment

DOVE: A Data-Oblivious Virtual Environment.
Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, and Carl A. Gunter.
ISOC Network and Distributed Systems Security (NDSS) Symposium, February, 2021.
NDSS [Video]. Extended arXiv version.

Last updated on Thursday, May 27, 2021, 5:14 pm

A Pragmatic Approach to Membership Inferences on Machine Learning Models

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, and Kai Chen.
IEEE European Symposium on Security and Privacy (EuroS&P), September, 2020.

Last updated on Thursday, May 27, 2021, 5:26 pm

Grand Challenges for Embedded Security Research in a Connected World

Grand Challenges for Embedded Security Research in a Connected World.
Wayne Burleson, Kevin Fu, Denise Anthony, Jorge Guajardo, Carl Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanafar, Carl Landwehr, and Susan Squires.
arXiv:2005.06585 [cs.CY], May 2020.

Last updated on Sunday, May 23, 2021, 11:13 am

A Hypothesis Testing Approach to Sharing Logs with Confidence

A Hypothesis Testing Approach to Sharing Logs with Confidence,
Yunhui Long, Le Xu, and Carl A. Gunter.
ACM Conference on Data and Application Security and Privacy (CODASPY ’20), New Orleans, LA, March 2020.


Last updated on Friday, May 21, 2021, 9:54 pm

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, and Haifeng Chen.
ISOC Network and Distributed Systems Security (NDSS ’20) Symposium, February, 2020.

Last updated on Saturday, May 22, 2021, 9:32 am

WSEmail: An architecture and system for secure Internet messaging based on web services

WSEmail: An architecture and system for secure Internet messaging based on web services.
Michael J. May, Kevin D. Lux, and Carl A. Gunter.
Service Oriented Computing and Applications (2020) 14:5–17.

Last updated on Saturday, May 22, 2021, 11:46 am

WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services

WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services..
Michael J. May, Kevin D. Lux, and Carl A. Gunter.
arXiv:1908.02108 [cs.NI], December, 2019.

Last updated on Thursday, May 27, 2021, 5:28 pm

Charting the Attack Surface of Trigger-Action IoT Platforms

Charting the Attack Surface of Trigger-Action IoT Platforms.
Qi Wang, Pubali Datta,Wei Yang, Si Liu, Adam Bates, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’19), United Kingdom, November, 2019.

Last updated on Friday, May 21, 2021, 5:09 pm

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms,
Avesta Hojjati, Yunhui Long, Soteris Demetriou, and Carl A. Gunter.
ACM Hot Topics in the Science of Security Symposium (HotSoS), April, 2019, Nashville, TN,  [PPT]


Last updated on Sunday, May 23, 2021, 9:02 am