Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure E Barka, CA Kerrache, H Benkraouda, K Shuaib, F Ahmad, F Kurugollu Transactions on Emerging Telecommunications Technologies 33 (8), e3706, 2022 | 65 | 2022 |
Facehack: Triggering backdoored facial recognition systems using facial characteristics E Sarkar, H Benkraouda, M Maniatakos arXiv preprint arXiv:2006.11623, 2020 | 43 | 2020 |
{ICSFuzz}: Manipulating {I/Os} and repurposing binary code to enable instrumented fuzzing in {ICS} control applications D Tychalas, H Benkraouda, M Maniatakos 30th USENIX Security Symposium (USENIX Security 21), 2847-2862, 2021 | 39 | 2021 |
I came, I saw, I hacked: Automated generation of process-independent attacks for industrial control systems E Sarkar, H Benkraouda, M Maniatakos Proceedings of the 15th ACM asia conference on computer and communications …, 2020 | 21 | 2020 |
Facehack: Attacking facial recognition systems using malicious facial characteristics E Sarkar, H Benkraouda, G Krishnan, H Gamil, M Maniatakos IEEE Transactions on Biometrics, Behavior, and Identity Science 4 (3), 361-372, 2021 | 20 | 2021 |
Snifu: Secure network interception for firmware updates in legacy plcs H Benkraouda, MA Chakkantakath, A Keliris, M Maniatakos 2020 IEEE 38th VLSI Test Symposium (VTS), 1-6, 2020 | 16 | 2020 |
Everybody’s got ML, tell me what else you have: Practitioners’ perception of ML-based security tools and explanations J Mink, H Benkraouda, L Yang, A Ciptadi, A Ahmadzadeh, D Votipka, ... 2023 IEEE Symposium on Security and Privacy (SP), 2068-2085, 2023 | 15 | 2023 |
Image reconstruction attacks on distributed machine learning models H Benkraouda, K Nahrstedt Proceedings of the 2nd ACM International Workshop on Distributed Machine …, 2021 | 10 | 2021 |
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications H Benkraouda, A Agrawal, D Tychalas, M Sazos, M Maniatakos Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 83-89, 2023 | 2 | 2023 |
You Can’t Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries using Pseudo Labels H Benkraouda, N Diwan, G Wang 2025 IEEE Symposium on Security and Privacy (SP), 36-36, 2024 | | 2024 |
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks C Wang, Z Jia, H Benkraouda, C Zevnik, N Heuermann, R Foulger, ... Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-17, 2024 | | 2024 |