AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance

AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance,
Tianyuan Liu, Avesta Hojjati, Adam Bates, and Klara Nahrstedt.
IEEE ICDCS 2018, 38th IEEE International Conference on Distributed Computing Systems, July 2018, Vienna, Austria.

Last updated on Sunday, December 9, 2018, 8:48 am

Evaluating Detectors on Optimal Attack Vectors that Enable Electricity Theft and DER Fraud

Evaluating Detectors on Optimal Attack Vectors that Enable Electricity Theft and DER Fraud,
Varun Badrinath Krishna, Carl A. Gunter, and William H. Sanders.
IEEE Journal of Selected Topics in Signal Processing, August 2018.

Last updated on Sunday, June 3, 2018, 10:28 am

Inferring Properties of Neural Networks with Intelligent Designs

Inferring Properties of Neural Networks with Intelligent Designs,
Karan Ganju.
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2018.

Last updated on Sunday, June 3, 2018, 10:09 am

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward J. Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, and William P. King.
ACM Computer and Communications Security (CCS ’16), October, 2016.

Last updated on Monday, October 31, 2016, 10:43 am

Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems

Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems,
Yong Yang, Lu Su, Mohammad Khan, Michael LeMay, Tarek Abdelzaher, and Jiawei Han.
ACM Transactions on Sensor Networks, Vol. 11, No. 2, December 2014.

Last updated on Tuesday, December 16, 2014, 7:19 pm

Privacy-Preserving Vehicle Miles Traveled (PPVMT) Tax

Privacy-Preserving Vehicle Miles Traveled (PPVMT) Tax
Gaurav Lahoti
Master of Science Thesis, University of Illinois at Urbana-Champaign, August 2014.

Last updated on Thursday, August 7, 2014, 11:23 am

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
arXiv:1404.3465 [cs.CR], April 2014.

Last updated on Sunday, May 18, 2014, 3:12 pm

Cumulative Attestation Kernels for Embedded Systems

Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
IEEE Transactions on Smart Grid, June 2012. [BIB]

Last updated on Thursday, July 19, 2012, 10:45 am

Reliable Telemetry in White Spaces using Remote Attestation

Reliable Telemetry in White Spaces using Remote Attestation
Omid Fatemieh, Michael LeMay, and Carl A. Gunter
Annual Computer Security Applications Conference (ACSAC ’11), Orlando, FL, December 2011. [PPT][BIB][Related]

Last updated on Tuesday, December 13, 2011, 12:15 pm

Compact Integrity-Aware Architectures

Compact Integrity-Aware Architectures
Michael LeMay
Doctoral Thesis, University of Illinois at Urbana-Champaign, August 2011. [BIB][Related]

Last updated on Wednesday, December 7, 2011, 3:33 pm