Ghost Installer in the Shadow: Security Analysis of App Installation on Android

Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Yeonjoon Lee, Tongxin Li, Nan Zhang; Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen; Xiaoyong Zhou; Xinhui Han, Michael Grace
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 17′), Denver, CO, June 2017.

Last updated on Tuesday, January 2, 2018, 9:27 am

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling,
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili.
The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP 2017), Columbus, NY, November 2017.

Last updated on Friday, December 29, 2017, 1:05 pm

Towards Measuring Membership Privacy

Towards Measuring Membership Privacy,
Yunhui Long, Vincent Bindschaedler, and Carl A. Gunter.
arXiv:1712.09136 [cs.CR], December 2017.

Last updated on Wednesday, December 27, 2017, 9:52 am

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX,
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’17), October, 2017.

Last updated on Saturday, October 14, 2017, 12:50 pm

Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises

Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises,
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov.
Research in Attacks, Intrusions and Defenses (RAID ’17), Atlanta, GA, September, 2017.

Last updated on Saturday, December 2, 2017, 4:37 pm

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps,
Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter.
Annual Computer Security Applications Conference (ACSAC ’17), December, 2017.

Last updated on Sunday, November 5, 2017, 8:57 pm

CamForensics: Understanding Visual Privacy Leaks in the Wild

CamForensics: Understanding Visual Privacy Leaks in the Wild,
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon Cox, Kyu-Han Kim.
ACM Embedded Networked Sensor Systems (SenSys ’17), November 2017.


Last updated on Sunday, May 23, 2021, 9:13 am

Plausible Deniability for Privacy-Preserving Data Synthesis

Plausible Deniability for Privacy-Preserving Data Synthesis
Vincent Bindschaedler, Reza Shokri, Carl A. Gunter.
VLDB Endowment International Conference on Very Large Data Bases (VLDB ’17), Munich, Germany, August 28, 2017.

Last updated on Sunday, November 5, 2017, 8:59 pm

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.

HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps,
Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace.
ACM Security and Wireless and Mobile Networks (WiSec ’17), Boston, MA, July 2017. [PPT]


Last updated on Wednesday, May 26, 2021, 8:11 am

VISUALIZATION AND DIFFERENTIAL PRIVACY

Visualization and Differential Privacy,
Hyun Bin Lee.
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2017.

Last updated on Sunday, August 6, 2017, 2:36 pm