If you made any changes in Pure these will be visible here soon.

Research Output

2020

A Hypothesis Testing Approach to Sharing Logs with Confidence

Long, Y., Xu, L. & Gunter, C. A., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 307-318 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

WSEmail: An architecture and system for secure Internet messaging based on web services

May, M. J., Lux, K. D. & Gunter, C. A., Jan 1 2020, (Accepted/In press) In : Service Oriented Computing and Applications.

Research output: Contribution to journalArticle

2019

Beeer: Distributed record and replay for medical devices in hospital operating rooms

Hojjati, A., Demetriou, S., Long, Y. & Gunter, C. A., Apr 1 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019. Association for Computing Machinery, a1. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Charting the atack surface of trigger-action IoT platforms

Wang, Q., Datta, P., Yang, W., Liu, S., Bates, A. & Gunter, C. A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1439-1453 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

CommanderSong: A systematic approach for practical adversarial voice recognition

Yuan, X., Chen, Y., Zhao, Y., Long, Y., Liu, X., Chen, K., Zhang, S., Huang, H., Wang, X. F. & Gunter, C. A., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 49-64 16 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

De facto diagnosis specialties: Recognition and discovery

Zhang, A., Lu, X., Gunter, C. A., Yao, S., Tao, F., Zhu, R., Gui, H., Fabbri, D., Liebovitz, D. & Malin, B., 2018, In : Learning Health Systems. 2, 3, e10057.

Research output: Contribution to journalArticle

Open Access

Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and der Fraud

Krishna, V. B., Gunter, C. A. & Sanders, W. H., Aug 2018, In : IEEE Journal on Selected Topics in Signal Processing. 12, 4, p. 790-805 16 p., 8355252.

Research output: Contribution to journalArticle

NRF: A naive re-identification framework

Santu, S. K. K., Bindschadler, V., Zhai, C. X. & Gunter, C. A., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Response: Real-time, secure, and privacy-aware video redaction system

Chen, B., Nahrstedt, K. & Gunter, C., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 39-48 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C. A., Zhou, X. & Grace, M., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 122-133 12 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

Wang, W., Chen, G., Pan, X., Zhang, Y., Wang, X. F., Bindschaedler, V., Tang, H. & Gunter, C. A., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2421-2434 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps

Yang, W., Kong, D., Xie, T. & Gunter, C. A., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 288-302 15 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Draco: A system for uniform and fine-grained access control for web code on Android

Tuncay, G. S., Demetriou, S. & Gunter, C. A., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 104-115 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leave your phone at the door: Side channels that reveal factory floor secrets

Hojjati, A., Adhikari, A., Struckmann, K., Chou, E. J., Nguyen, T. N. T., Madan, K., Winslett, M. S., Gunter, C. A. & King, W. P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 883-894 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Plausible deniability for privacy-preserving data synthesis

Bindschaedler, V., Shokri, R. & Gunter, C. A., 2016, In : Proceedings of the VLDB Endowment. 10, 5, p. 481-492 12 p.

Research output: Contribution to journalConference article

Privacy and Security in Mobile Health: A Research Agenda

Kotz, D., Gunter, C. A., Kumar, S. & Weiner, J. P., Jun 2016, Computer, 49, 6, p. 22-30 9 p.

Research output: Contribution to specialist publicationArticle

Towards mobile query auto-completion: An efficient mobile application-Aware approach

Zhang, A., Goyal, A., Baeza-Yates, R., Chang, Y., Han, J., Gunter, C. A. & Deng, H., Jan 1 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 579-590 12 p. (25th International World Wide Web Conference, WWW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

AdaQAC: Adaptive query auto-completion via implicit negative feedback

Zhang, A., Goyal, A., Kong, W., Deng, H., Dong, A., Chang, Y., Gunter, C. A. & Han, J., Aug 9 2015, SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery, Inc, p. 143-152 10 p. (SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Building bridges across electronic health record systems through inferred phenotypic topics

Chen, Y., Ghosh, J., Bejan, C. A., Gunter, C. A., Gupta, S., Kho, A., Liebovitz, D., Sun, J., Denny, J. & Malin, B., Jun 1 2015, In : Journal of Biomedical Informatics. 55, p. 82-93 12 p.

Research output: Contribution to journalArticle

Discovering de facto diagnosis specialties

Lu, X., Zhang, A., Gunter, C., Fabbri, D., Liebovitz, D. & Malin, B., Sep 9 2015, BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 7-16 10 p. (BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization

Chen, Y., Xie, W., Gunter, C. A., Liebovitz, D., Mehrotra, S., Zhang, H. & Malin, B., Jan 1 2015, In : AMIA ... Annual Symposium proceedings. AMIA Symposium. 2015, p. 416-425 10 p.

Research output: Contribution to journalArticle

Network-on-chip firewall: Countering defective and malicious system-on-chip hardware

LeMay, M. & Gunter, C. A., Jan 1 2015, Logic, Rewriting and Concurrency - Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Ölveczky, P. C., Talcott, C. & Martí-Oliet, N. (eds.). Springer-Verlag Berlin Heidelberg, p. 404-426 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy in the genomic era

Naveed, M., Ayday, E., Clayton, E. W., Fellay, J., Gunter, C. A., Hubaux, J. P., Malin, B. A. & Wang, X., Aug 1 2015, In : ACM Computing Surveys. 48, 1, 6.

Research output: Contribution to journalArticle

Security for mobile and cloud frontiers in healthcare

Kotz, D., Fu, K., Gunter, C. & Rubin, A., Aug 1 2015, In : Communications of the ACM. 58, 8, p. 21-23 3 p.

Research output: Contribution to journalShort survey

Toward a science of learning systems: A research agenda for the high-functioning Learning Health System

Friedman, C. P., Rubin, J., Brown, J., Buntin, M., Corn, M., Etheredge, L., Gunter, C., Musen, M., Platt, R., Stead, W., Sullivan, K. & Van Houweling, D., 2015, In : Journal of the American Medical Informatics Association. 22, 1, p. 43-50 8 p.

Research output: Contribution to journalArticle

2014

Controlled functional encryption

Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E., Hubaux, J. P. & Gunter, C. A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1280-1291 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, CCS 2014 - Proceedings of the 21st ACM Conference on Computer and Communications Security. November ed. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting privacy-sensitive events in medical text

Jindal, P., Gunter, C. & Roth, D., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 617-620 4 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic searchable encryption via blind storage

Naveed, M., Prabhakaran, M. M. & Gunter, C., Nov 13 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 639-654 16 p. 6956592. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joint inference for end-to-end coreference resolution for clinical notes

Jindal, P., Roth, D. & Gunter, C., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 192-201 10 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy-preserving audit for broker-based health information exchange

Oh, S. E., Chun, J. Y., Jia, L., Garg, D., Gunter, C. A. & Datta, A., 2014, p. 313-320. 8 p.

Research output: Contribution to conferencePaper

Privacy risk in anonymized heterogeneous information networks

Zhang, A., Gunter, C. A., Xie, X., Han, J., Chang, K. C. C. & Wang, X., Jan 1 2014, Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings. Leroy, V., Christophides, V., Christophides, V., Idreos, S., Kementsietsidis, A., Garofalakis, M. & Amer-Yahia, S. (eds.). OpenProceedings.org, University of Konstanz, University Library, p. 595-606 12 p. (Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Concerns in Android mHealth Apps

He, D., Naveed, M., Gunter, C. A. & Nahrstedt, K., Jan 1 2014, In : AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium. 2014, p. 645-654 10 p.

Research output: Contribution to journalArticle

2013

Building a smarter health and wellness future: Privacy and security challenges

Gunter, C. A., Jan 1 2013, ICTs and the Health Sector: Towards Smarter Health and Wellness Models. Organisation for Economic Cooperation and Development (OECD), Vol. 9789264202863. p. 141-158 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Evolving role definitions through permission invocation patterns

Zhang, W., Chen, Y., Gunter, C., Liebovitz, D. & Malin, B., Sep 2 2013, SACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies. p. 37-47 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity, location, disease and more: Inferring your secrets from android public resources

Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X. F., Gunter, C. A. & Nahrstedt, K., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1017-1028 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining deviations from patient care pathways via electronic medical record system audits

Zhang, H., Mehotra, S., Liebovitz, D., Gunter, C. A. & Malin, B., Dec 1 2013, In : ACM Transactions on Management Information Systems. 4, 4, 17.

Research output: Contribution to journalArticle

Modeling and detecting anomalous topic access

Gupta, S., Hanson, C., Gunter, C. A., Frank, M., Liebovitz, D. & Malin, B., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 100-105 6 p. 6578795. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Securing information technology in healthcare

Anthony, D., Campbell, A. T., Candon, T., Gettinger, A., Kotz, D., Marsch, L. A., Molina-Markham, A., Page, K., Smith, S. W., Gunter, C. A. & Johnson, M. E., Nov 1 2013, In : IEEE Security and Privacy. 11, 6, p. 25-33 9 p., 6576746.

Research output: Contribution to journalArticle

2012

Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks

Khanna, S., Venkatesh, S. S., Fatemieh, O., Khan, F. & Gunter, C. A., Jun 1 2012, In : IEEE/ACM Transactions on Networking. 20, 3, p. 715-728 14 p., 6086738.

Research output: Contribution to journalArticle

Cumulative attestation kernels for embedded systems

Lemay, M. & Gunter, C. A., 2012, In : IEEE Transactions on Smart Grid. 3, 2, p. 744-760 17 p., 6204240.

Research output: Contribution to journalArticle

2011

Application-aware secure multicast for power grid communications

Zhang, J. & Gunter, C. A., Apr 2011, In : International Journal of Security and Networks. 6, 1, p. 40-52 13 p.

Research output: Contribution to journalArticle

Distributed non-intrusive load monitoring

Bergman, D. C., Jin, D., Juen, J. P., Tanaka, N., Gunter, C. A. & Wright, A. K., Jun 9 2011, 2011 IEEE PES Innovative Smart Grid Technologies, ISGT 2011. 5759180. (IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enforcing executing-implies-verified with the integrity-aware processor

LeMay, M. & Gunter, C. A., Jan 1 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Balacheff, B., Beres, Y., Sasse, A., McCune, J. M., Perrig, A. & Sadeghi, A-R. (eds.). Springer-Verlag Berlin Heidelberg, p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enforcing executing-implies-verified with the integrity-aware processor

LeMay, M. & Gunter, C. A., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experience-based access management: A life-cycle framework for identity and access management systems

Gunter, C., Liebovitz, D. & Malin, B., Sep 1 2011, In : IEEE Security and Privacy. 9, 5, p. 48-55 8 p., 5887313.

Research output: Contribution to journalArticle

Making DTNs robust against spoofing attacks with localized countermeasures

Uddin, M. Y. S., Khurshid, A., Jung, H. D., Gunter, C., Caesar, M. C. & Abdelzaher, T., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 332-340 9 p. 5984915. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution