A survey on sensor-based threats and attacks to smart devices and applications AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac IEEE Communications Surveys & Tutorials 23 (2), 1125-1159, 2021 | 306 | 2021 |
Audroid: Preventing attacks on audio channels in mobile devices G Petracca, Y Sun, T Jaeger, A Atamli Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 93 | 2015 |
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger 26th USENIX security symposium (USENIX Security 17), 379-396, 2017 | 45 | 2017 |
Adaptive data protection in distributed systems AC Squicciarini, G Petracca, E Bertino Proceedings of the third ACM conference on Data and application security and …, 2013 | 33 | 2013 |
Analysis of trusted execution environment usage in samsung KNOX A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016 | 26 | 2016 |
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ... 30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021 | 21 | 2021 |
Pileus: Protecting user resources from vulnerable cloud services Y Sun, G Petracca, X Ge, T Jaeger Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 21 | 2016 |
A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv 2018 AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac arXiv preprint arXiv:1802.02041, 1802 | 19 | 1802 |
On risk in access control enforcement G Petracca, F Capobianco, C Skalka, T Jaeger Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 18 | 2017 |
Inevitable failure: The flawed trust assumption in the cloud Y Sun, G Petracca, T Jaeger Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 13 | 2014 |
Situational awareness through reasoning on network incidents AC Squicciarini, G Petracca, WG Horne, A Nath Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 13 | 2014 |
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger 28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019 | 12 | 2019 |
Cloud armor: Protecting cloud commands from compromised cloud services Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman 2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015 | 12 | 2015 |
A framework for application partitioning using trusted execution environments A Atamli‐Reineh, A Paverd, G Petracca, A Martin Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017 | 11 | 2017 |
Agility maneuvers to mitigate inference attacks on sensed location data G Petracca, LM Marvel, A Swami, T Jaeger MILCOM 2016-2016 IEEE Military Communications Conference, 259-264, 2016 | 10 | 2016 |
h. Aksu, t. Jaeger, AS Uluagac, A survey on sensor-based threats and attacks to smart devices and applications AK Sikder, G Petracca IEEE Commun. Surv. Tutor 23, 1125-1159, 2021 | 7 | 2021 |
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems A Atamli, G Petracca, J Crowcroft Proceedings of the 14th International Conference on Availability …, 2019 | 7 | 2019 |
Aware: Controlling App Access to I/O Devices on Mobile Platforms G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger arXiv preprint arXiv:1604.02171, 2016 | 7 | 2016 |
Polyscope: Multi-policy access control analysis to triage android scoped storage YT Lee, H Chen, W Enck, H Vijayakumar, N Li, Z Qian, G Petracca, ... IEEE Transactions on Dependable and Secure Computing, 2023 | 6 | 2023 |
Adaptive data management for self-protecting objects in cloud computing systems AC Squicciarini, G Petracca, E Bertino 2012 8th international conference on network and service management (cnsm …, 2012 | 6 | 2012 |