Securing Emerging IoT Systems Through Systematic Analysis and Design

Securing Emerging IoT Systems Through Systematic Analysis and Design.
Qi Wang.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, November, 2020.

Last updated on Friday, May 28, 2021, 3:58 pm

A Pragmatic Approach to Membership Inferences on Machine Learning Models

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, and Kai Chen.
IEEE European Symposium on Security and Privacy (EuroS&P), September, 2020.

Last updated on Thursday, May 27, 2021, 5:26 pm

Grand Challenges for Embedded Security Research in a Connected World

Grand Challenges for Embedded Security Research in a Connected World.
Wayne Burleson, Kevin Fu, Denise Anthony, Jorge Guajardo, Carl Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanafar, Carl Landwehr, and Susan Squires.
arXiv:2005.06585 [cs.CY], May 2020.

Last updated on Sunday, May 23, 2021, 11:13 am

Understanding and Mitigating Privacy Risk in Machine Learning Systems

Understanding and Mitigating Privacy Risk in Machine Learning Systems.
Yunhui Long.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, May, 2020.

Last updated on Friday, May 28, 2021, 3:33 pm

A Hypothesis Testing Approach to Sharing Logs with Confidence

A Hypothesis Testing Approach to Sharing Logs with Confidence,
Yunhui Long, Le Xu, and Carl A. Gunter.
ACM Conference on Data and Application Security and Privacy (CODASPY ’20), New Orleans, LA, March 2020.


Last updated on Friday, May 21, 2021, 9:54 pm

Charting the Attack Surface of Trigger-Action IoT Platforms

Charting the Attack Surface of Trigger-Action IoT Platforms.
Qi Wang, Pubali Datta,Wei Yang, Si Liu, Adam Bates, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’19), United Kingdom, November, 2019.

Last updated on Friday, May 21, 2021, 5:09 pm

Practical Least Privilege for Cross-Origin Interactions on Mobile Operating Systems

Practical Least Privilege for Cross-Origin Interactions on Mobile Operating Systems.
Güliz Seray Tuncay.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, July, 2019.

Last updated on Friday, May 28, 2021, 3:35 pm

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms,
Avesta Hojjati, Yunhui Long, Soteris Demetriou, and Carl A. Gunter.
ACM Hot Topics in the Science of Security Symposium (HotSoS), April, 2019, Nashville, TN,  [PPT]


Last updated on Sunday, May 23, 2021, 9:02 am

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Distributed and Secure ML with Self-tallying Multi-party Aggregation,
Yunhui Long, Tanmay Gangwani, Muhammad Haris Mughees, and Carl A. Gunter.
NeurIPS Workshop on Privacy Preserving Machine Learning, Montréal, Canada, December 2018. [VIDEO]

Last updated on Monday, May 20, 2019, 8:11 pm

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System,
Bo Chen, Klara Nahrstedt, and Carl A. Gunter.
ACM Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), November, 2018, New York, NY.

Last updated on Sunday, December 9, 2018, 8:47 am