See No Evil: Phishing for Permissions with False Transparency.
Güliz Seray Tuncay, Jingyu Qian. and Carl A. Gunter.
USENIX Security Symposium, August, 2020.
Last updated on Saturday, May 22, 2021, 4:03 pm
See No Evil: Phishing for Permissions with False Transparency.
Güliz Seray Tuncay, Jingyu Qian. and Carl A. Gunter.
USENIX Security Symposium, August, 2020.
Last updated on Saturday, May 22, 2021, 4:03 pm
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter.
USENIX Security, Baltimore, MD, 2018.
Last updated on Saturday, May 22, 2021, 6:25 pm
CoDrive: Improving Automobile Positioning via Collaborative Driving,
Soteris Demetriou, Puneet Jain, Kyu-Han Kim.
IEEE International Conference on Computer Communications (INFOCOM 18′), Honolulu, HI, April 2018.
Last updated on Sunday, June 3, 2018, 7:47 pm
Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Yeonjoon Lee, Tongxin Li, Nan Zhang; Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen; Xiaoyong Zhou; Xinhui Han, Michael Grace
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 17′), Denver, CO, June 2017.
Last updated on Tuesday, January 2, 2018, 9:27 am
GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling,
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili.
The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP 2017), Columbus, NY, November 2017.
Last updated on Friday, December 29, 2017, 1:05 pm
CamForensics: Understanding Visual Privacy Leaks in the Wild,
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon Cox, Kyu-Han Kim.
ACM Embedded Networked Sensor Systems (SenSys ’17), November 2017.
Last updated on Sunday, May 23, 2021, 9:13 am
Visualization and Differential Privacy,
Hyun Bin Lee.
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2017.
Last updated on Sunday, August 6, 2017, 2:36 pm
Side-Channel Attacks on Shared Search Indexes
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.
Last updated on Tuesday, January 2, 2018, 9:38 am
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.
Last updated on Tuesday, January 2, 2018, 9:35 am
LSTM and Extended Dead Reckoning Automobile Route Prediction Using Smartphone Sensors,
Ryan Freedman,
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2017.
Last updated on Sunday, August 6, 2017, 2:32 pm