Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1761–1775https://doi.org/10.1145/3658644.3690216Building Automation Systems (BAS) play a pivotal role in modern smart buildings, integrating sensors, controllers, and software to manage crucial functions such as HVAC, lighting, and more. The global smart building market is on the rise, underscoring ...
- research-articleDecember 2024
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2341–2354https://doi.org/10.1145/3658644.3670342Due to the diversity of architectures and peripherals of Internet of Things (IoT) systems, blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices. Existing blackbox fuzzing tools often rely on companion apps to ...
- research-articleSeptember 2024JUST ACCEPTED
Pivot: Panoramic-image-based VR User Authentication against Side-Channel Attacks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3694975With metaverse attracting increasing attention from both academic and industry, the application of virtual reality (VR) has extended beyond 3D immersive viewing/gaming to a broader range of areas, such as banking, shopping, tourism, education, etc., which ...
- research-articleJuly 2024
BBS: A secure and autonomous blockchain-based big-data sharing system
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 150, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103133AbstractChain of custody is needed to document the sequence of custody of sensitive big data such as various healthcare data. In this work, we propose a secure and autonomous big data sharing system (BBS) based on a permissioned blockchain. In our system,...
- ArticleNovember 2023
A Deep Learning Framework with Pruning RoI Proposal for Dental Caries Detection in Panoramic X-ray Images
AbstractDental caries is a prevalent noncommunicable disease that affects over half of the global population. It can significantly diminish individuals’ quality of life by impairing their eating and socializing abilities. Consistent dental check-ups and ...
-
- research-articleNovember 2023
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1660–1674https://doi.org/10.1145/3576915.3616600Physically unclonable hardware fingerprints can be used for device authentication. The photo-response non-uniformity (PRNU) is the most reliable hardware fingerprint of digital cameras and can be conveniently extracted from images. However, we find image ...
- ArticleSeptember 2022
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
AbstractThe address space layout randomization (ASLR) has been widely deployed on modern operating systems against code reuse attacks (CRAs) such as return-oriented programming (ROP) and return-to-libc. However, porting ASLR to resource-constrained IoT ...
- research-articleMay 2022
FUME: Fuzzing Message Queuing Telemetry Transport Brokers
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsPages 1699–1708https://doi.org/10.1109/INFOCOM48880.2022.9796755Message Queuing Telemetry Transport (MQTT) is a popular communication protocol used to interconnect devices with considerable network restraints, such as those found in Internet of Things (IoT). MQTT directly impacts a large number of devices, but the ...
- research-articleMay 2022
Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsPages 1709–1718https://doi.org/10.1109/INFOCOM48880.2022.9796703Tor is the largest anonymous communication system, providing anonymous communication services to approximately 2.8 million users and 170,000 hidden services per day. The Tor hidden service mechanism can protect a server from exposing its real identity ...
- research-articleMay 2022
Towards an Efficient Defense against Deep Learning based Website Fingerprinting
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsPages 310–319https://doi.org/10.1109/INFOCOM48880.2022.9796685Website fingerprinting (WF) attacks allow an attacker to eavesdrop on the encrypted network traffic between a victim and an anonymous communication system so as to infer the real destination websites visited by a victim. Recently, the deep learning (DL) ...
- research-articleJanuary 2022
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 19, Issue 1Pages 131–148https://doi.org/10.1109/TDSC.2020.2975157The rapid and wide adoption of microgrids (MGs) and the increasing popularity of electric vehicles (EVs) have created a unique opportunity for the integration of these technologies. In this article, we address the issue of demand response of EVs during MG ...
- research-articleOctober 2021
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 119, Issue Chttps://doi.org/10.1016/j.sysarc.2021.102240AbstractWith the extensive application of IoT techniques, IoT devices have become ubiquitous in daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT devices by tampering with system pre-installed programs or injecting new ...
- research-articleMay 2021
Prison Break of Android Reflection Restriction and Defense
IEEE INFOCOM 2021 - IEEE Conference on Computer CommunicationsPages 1–10https://doi.org/10.1109/INFOCOM42981.2021.9488788Java reflection technique is pervasively used in the Android system. To reduce the risk of reflection abuse, Android restricts the use of reflection at the Android Runtime (ART) to hide potentially dangerous methods/fields. We perform the first ...
- research-articleDecember 2020
On Runtime Software Security of TrustZone-M Based IoT Devices
GLOBECOM 2020 - 2020 IEEE Global Communications ConferencePages 1–7https://doi.org/10.1109/GLOBECOM42002.2020.9322370Internet of Things (IoT) devices have been increasingly integrated into our daily life. However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the device software at runtime are challenging to defend against if IoT ...
- research-articleAugust 2020
Breaking secure pairing of bluetooth low energy using downgrade attacks
SEC'20: Proceedings of the 29th USENIX Conference on Security SymposiumArticle No.: 3, Pages 37–54To defeat security threats such as man-in-the-middle (MITM) attacks, Bluetooth Low Energy (BLE) 4.2 and 5.x introduced a Secure Connections Only (SCO) mode, under which a BLE device can only accept secure pairing such as Passkey Entry and Numeric ...
- research-articleJuly 2020
BLESS: A BLE Application Security Scanning Framework
IEEE INFOCOM 2020 - IEEE Conference on Computer CommunicationsPages 636–645https://doi.org/10.1109/INFOCOM41043.2020.9155473Bluetooth Low Energy (BLE) is a widely adopted wireless communication technology in the Internet of Things (IoT). BLE offers secure communication through a set of pairing strategies. However, these pairing strategies are obsolete in the context of IoT. ...
- research-articleNovember 2019
CIM: Camera in Motion for Smartphone Authentication
IEEE Transactions on Information Forensics and Security (TIFS), Volume 14, Issue 11Pages 2987–3002https://doi.org/10.1109/TIFS.2019.2911173The photo response non-uniformity of a smartphone camera is a reliable hardware fingerprint that can be used to authenticate the smartphone owner. This type of camera-based authentication is convenient and of low cost since it requires only pictures ...
- research-articleApril 2019
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks
IEEE INFOCOM 2019 - IEEE Conference on Computer CommunicationsPages 1180–1188https://doi.org/10.1109/INFOCOM.2019.8737586Diverse anonymous communication systems are widely deployed as they can provide the online privacy protection and Internet anti-censorship service. However, these systems are severely abused and a large amount of anonymous traffic is malicious. To ...
- articleApril 2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data
Multimedia Tools and Applications (MTAA), Volume 78, Issue 7Pages 8337–8362https://doi.org/10.1007/s11042-018-6815-6Cameras for visual surveillance are extensively deployed to monitor people's locations and activities. The law enforcement can analyze the surveillance videos (V-data) to track the whereabouts of the criminal suspects. On the other hand, with the ...
- research-articleDecember 2018
The Peeping Eye in the Sky
2018 IEEE Global Communications Conference (GLOBECOM)Pages 1–7https://doi.org/10.1109/GLOCOM.2018.8647787In this paper, we investigate the threat of drones equipped with recording devices, which capture videos of individuals typing on their mobile devices and extract the touch input such as passcodes from the videos. Deploying this kind of attack from the ...