Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Access control Engineering & Materials Science
Semantics Engineering & Materials Science
Active networks Engineering & Materials Science
Network protocols Engineering & Materials Science
Specifications Engineering & Materials Science
Servers Engineering & Materials Science
Monitoring Engineering & Materials Science
Application programs Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C. A., Zhou, X. & Grace, M. Jul 18 2017 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Routers
Wi-Fi
Computer hardware
Cryptography

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

Wang, W., Chen, G., Pan, X., Zhang, Y., Wang, X. F., Bindschaedler, V., Tang, H. & Gunter, C. A. Oct 30 2017 CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2421-2434 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic random access storage
Hazards
Data storage equipment
Monitoring
Side channel attack

Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps

Yang, W., Kong, D., Xie, T. & Gunter, C. A. Dec 4 2017 Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, Vol. Part F132521, p. 288-302 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Semantics

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N. Jan 1 2017 Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Springer Verlag, Vol. 10453 LNCS, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining
Miners
Industry
Program processors
Virtualization

Draco: A system for uniform and fine-grained access control for web code on Android

Tuncay, G. S., Demetriou, S. & Gunter, C. A. Oct 24 2016 CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016, p. 104-115 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Access control
Web browsers
Android (operating system)
Chromium