- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- User Authentication and Security Systems
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Network Security and Intrusion Detection
- Security and Verification in Computing
- Privacy-Preserving Technologies in Data
- Wireless Body Area Networks
- Advanced Authentication Protocols Security
- Coding theory and cryptography
- Information and Cyber Security
- Adversarial Robustness in Machine Learning
- RFID technology advancements
- Augmented Reality Applications
- Ethics and Social Impacts of AI
- Virtual Reality Applications and Impacts
- Innovative Human-Technology Interaction
- Hate Speech and Cyberbullying Detection
- Interactive and Immersive Displays
- Anomaly Detection Techniques and Applications
- Opportunistic and Delay-Tolerant Networks
- Advanced Data Storage Technologies
University of Washington
2016-2025
University of California, San Diego
2002-2024
Seattle University
2013-2023
University of Southern California
2023
Pennsylvania State University
2023
Indiana University Bloomington
2023
University of Illinois Urbana-Champaign
2023
Institute of Electrical and Electronics Engineers
2022
Regional Municipality of Niagara
2022
IEEE Computer Society
2022
Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added input. Given emerging physical systems using DNNs in safety-critical situations, examples could mislead these and cause dangerous situations. Therefore, understanding world is an important step towards developing resilient learning algorithms. We propose a general attack algorithm, Robust Physical Perturbations (RP2), generate...
Modern automobiles are no longer mere mechanical devices; they pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency safety, it also introduced a range new potential risks. In paper we experimentally evaluate these issues on modern automobile demonstrate the fragility underlying system structure. We that an attacker who is able to infiltrate virtually any...
Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to U.S. market in 2003, this model ICD includes pacemaker technology is designed communicate wirelessly with a nearby external programmer 175 kHz frequency range. After partially reverse-engineering ICD's communications protocol oscilloscope software radio, we implemented several radio-based attacks that could compromise patient safety privacy. Motivated by our desire improve...
With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities states throughout the are adopting paperless electronic systems from a number of different vendors. We present security analysis source code one such machine used in share market. Our shows that this system is far below even most minimal standards applicable other contexts. identify several problems including unauthorized privilege escalation, incorrect use...
Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added input. Given emerging physical systems using DNNs in safety-critical situations, examples could mislead these and cause dangerous situations.Therefore, understanding world is an important step towards developing resilient learning algorithms. We propose a general attack algorithm,Robust Physical Perturbations (RP2), generate...
We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...
Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional such as safety utility. Implantable monitor treat physiological conditions within the body. These - including pacemakers, cardiac defibrillators (ICDs), drug delivery systems, neurostimulators can help manage a broad range of ailments, arrhythmia, diabetes, Parkinson's disease. IMDs' pervasiveness continues to swell, upward 25 million US...
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and relatively low latency service. Low achieved through Tor's ability balance traffic load by optimizing router selection probabilistically favor routers with high bandwidth capabilities.
AR systems pose potential security concerns that should be addressed before the become widespread.
Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs make incorrect predictions. Recent work has shown these attacks generalize the physical domain, create perturbations on objects fool image classifiers under a variety of real-world conditions. Such pose risk deep learning models used in safety-critical cyber-physical systems. In this work, we extend more challenging object detection models, broader class algorithms widely detect and...
Abstract Today’s automobiles leverage powerful sensors and embedded computers to optimize efficiency, safety, driver engagement. However the complexity of possible inferences using in-car sensor data is not well understood. While we do know attempts by automotive manufacturers or makers after-market components (like insurance dongles) violate privacy, a key question ask is: could they (or their collection later accidental leaks data) driver’s privacy? In present study, experimentally...
Modern client platforms, such as iOS, Android, Windows Phone, 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem systems is how to allow users grant applications access user-owned resources, e.g., privacy- cost-sensitive devices like the camera or user data residing other applications. key challenge enable a way that non-disruptive while still maintaining least-privilege restrictions on In this paper, we take approach of...
The global health threat from COVID-19 has been controlled in a number of instances by large-scale testing and contact tracing efforts. We created this document to suggest three functionalities on how we might best harness computing technologies supporting the goals public organizations minimizing morbidity mortality associated with spread COVID-19, while protecting civil liberties individuals. In particular, work advocates for third-party free approach assisted mobile tracing, because such...
Large language model (LLM) platforms, such as ChatGPT, have recently begun offering an app ecosystem to interface with third-party services on the internet. While these apps extend capabilities of LLM they are developed by arbitrary third parties and thus cannot be implicitly trusted. Apps also platforms users using natural language, which can imprecise interpretations. In this paper, we propose a framework that lays foundation for platform designers analyze improve security, privacy, safety...
We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...