Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. S Shen, S Shinde, S Ramesh, A Roychoudhury, P Saxena NDSS, 2019 | 37 | 2019 |
SoundUAV Towards Delivery Drone Authentication via Acoustic Noise Fingerprinting S Ramesh, T Pathier, J Han Proceedings of the 5th Workshop on Micro Aerial Vehicle Networks, Systems …, 2019 | 30 | 2019 |
Acoustics to the rescue: Physical key inference attack revisited S Ramesh, R Xiao, A Maiti, JT Lee, H Ramprasad, A Kumar, M Jadliwala, ... 30th USENIX Security Symposium (USENIX Security 21), 3255-3272, 2021 | 8 | 2021 |
Listen to your key: Towards acoustics-based physical key inference S Ramesh, H Ramprasad, J Han Proceedings of the 21st International Workshop on Mobile Computing Systems …, 2020 | 7 | 2020 |
RollBack: a new time-agnostic replay attack against the automotive remote keyless entry systems L Csikor, HW Lim, JW Wong, S Ramesh, RP Parameswarath, MC Chan ACM Transactions on Cyber-Physical Systems 8 (1), 1-25, 2024 | 5 | 2024 |
SoundUAV: Fingerprinting Acoustic Emanations for Delivery Drone Authentication (poster) S Ramesh, T Pathier, J Han Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 3 | 2019 |
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals S Ramesh, GS Hadi, S Yang, MC Chan, J Han Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 2 | 2022 |
MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals R Xiao, T Li, S Ramesh, J Han, J Han Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023 | 1 | 2023 |