TrustLite: A security architecture for tiny embedded devices

P Koeberl, S Schulz, AR Sadeghi… - Proceedings of the Ninth …, 2014 - dl.acm.org
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …

Beauty and the burst: Remote identification of encrypted video streams

R Schuster, V Shmatikov, E Tromer - 26th USENIX Security Symposium …, 2017 - usenix.org
The MPEG-DASH streaming video standard contains an information leak: even if the stream
is encrypted, the segmentation prescribed by the standard causes content-dependent …

Packet-level signatures for smart home devices

R Trimananda, J Varmarken, A Markopoulou… - Network and …, 2020 - par.nsf.gov
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …

[PDF][PDF] Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study

I Rouf, R Miller, H Mustafa, T Taylor, S Oh… - 19th USENIX Security …, 2010 - usenix.org
Wireless networks are being integrated into the modern automobile. The security and
privacy implications of such in-car networks, however, have are not well understood as their …

Hawkes processes for events in social media

MA Rizoiu, Y Lee, S Mishra, L **e - Frontiers of multimedia research, 2017 - dl.acm.org
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …

Tracking unmodified smartphones using wi-fi monitors

ABM Musa, J Eriksson - Proceedings of the 10th ACM conference on …, 2012 - dl.acm.org
Smartphones with Wi-Fi enabled periodically transmit Wi-Fi messages, even when not
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …

Side-channel leaks in web applications: A reality today, a challenge tomorrow

S Chen, R Wang, XF Wang… - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
With software-as-a-service becoming mainstream, more and more applications are
delivered to the client through the Web. Unlike a desktop application, a web application is …

[PDF][PDF] Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.

CV Wright, SE Coull, F Monrose - NDSS, 2009 - git.gnunet.org
Recent work has shown that properties of network traffic that remain observable after
encryption, namely packet sizes and timing, can reveal surprising information about the …

Skypemorph: Protocol obfuscation for tor bridges

H Mohajeri Moghaddam, B Li, M Derakhshani… - Proceedings of the …, 2012 - dl.acm.org
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …

Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users' behavior of balancing perceived …

H Lee, H Park, J Kim - International Journal of Human-Computer Studies, 2013 - Elsevier
Despite the rapid growth of context-aware systems and ubiquitous computing, the factors
influencing users' decision to share their context information in a social setting are poorly …