If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

A Hypothesis Testing Approach to Sharing Logs with Confidence

Long, Y., Xu, L. & Gunter, C. A., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 307-318 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Beeer: Distributed record and replay for medical devices in hospital operating rooms

Hojjati, A., Demetriou, S., Long, Y. & Gunter, C. A., Apr 1 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019. Association for Computing Machinery, a1. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Charting the atack surface of trigger-action IoT platforms

Wang, Q., Datta, P., Yang, W., Liu, S., Bates, A. & Gunter, C. A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1439-1453 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

CommanderSong: A systematic approach for practical adversarial voice recognition

Yuan, X., Chen, Y., Zhao, Y., Long, Y., Liu, X., Chen, K., Zhang, S., Huang, H., Wang, X. F. & Gunter, C. A., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 49-64 16 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

NRF: A naive re-identification framework

Santu, S. K. K., Bindschadler, V., Zhai, C. X. & Gunter, C. A., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Response: Real-time, secure, and privacy-aware video redaction system

Chen, B., Nahrstedt, K. & Gunter, C., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 39-48 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C. A., Zhou, X. & Grace, M., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 122-133 12 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

Wang, W., Chen, G., Pan, X., Zhang, Y., Wang, X. F., Bindschaedler, V., Tang, H. & Gunter, C. A., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2421-2434 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps

Yang, W., Kong, D., Xie, T. & Gunter, C. A., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 288-302 15 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Draco: A system for uniform and fine-grained access control for web code on Android

Tuncay, G. S., Demetriou, S. & Gunter, C. A., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 104-115 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leave your phone at the door: Side channels that reveal factory floor secrets

Hojjati, A., Adhikari, A., Struckmann, K., Chou, E. J., Nguyen, T. N. T., Madan, K., Winslett, M. S., Gunter, C. A. & King, W. P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 883-894 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards mobile query auto-completion: An efficient mobile application-Aware approach

Zhang, A., Goyal, A., Baeza-Yates, R., Chang, Y., Han, J., Gunter, C. A. & Deng, H., Jan 1 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 579-590 12 p. (25th International World Wide Web Conference, WWW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

AdaQAC: Adaptive query auto-completion via implicit negative feedback

Zhang, A., Goyal, A., Kong, W., Deng, H., Dong, A., Chang, Y., Gunter, C. A. & Han, J., Aug 9 2015, SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery, Inc, p. 143-152 10 p. (SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discovering de facto diagnosis specialties

Lu, X., Zhang, A., Gunter, C., Fabbri, D., Liebovitz, D. & Malin, B., Sep 9 2015, BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 7-16 10 p. (BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network-on-chip firewall: Countering defective and malicious system-on-chip hardware

LeMay, M. & Gunter, C. A., Jan 1 2015, Logic, Rewriting and Concurrency - Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Ölveczky, P. C., Talcott, C. & Martí-Oliet, N. (eds.). Springer-Verlag Berlin Heidelberg, p. 404-426 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Controlled functional encryption

Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E., Hubaux, J. P. & Gunter, C. A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1280-1291 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, CCS 2014 - Proceedings of the 21st ACM Conference on Computer and Communications Security. November ed. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting privacy-sensitive events in medical text

Jindal, P., Gunter, C. & Roth, D., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 617-620 4 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic searchable encryption via blind storage

Naveed, M., Prabhakaran, M. M. & Gunter, C., Nov 13 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 639-654 16 p. 6956592. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joint inference for end-to-end coreference resolution for clinical notes

Jindal, P., Roth, D. & Gunter, C., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 192-201 10 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy risk in anonymized heterogeneous information networks

Zhang, A., Gunter, C. A., Xie, X., Han, J., Chang, K. C. C. & Wang, X., Jan 1 2014, Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings. Leroy, V., Christophides, V., Christophides, V., Idreos, S., Kementsietsidis, A., Garofalakis, M. & Amer-Yahia, S. (eds.). OpenProceedings.org, University of Konstanz, University Library, p. 595-606 12 p. (Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Evolving role definitions through permission invocation patterns

Zhang, W., Chen, Y., Gunter, C., Liebovitz, D. & Malin, B., Sep 2 2013, SACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies. p. 37-47 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity, location, disease and more: Inferring your secrets from android public resources

Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X. F., Gunter, C. A. & Nahrstedt, K., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1017-1028 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modeling and detecting anomalous topic access

Gupta, S., Hanson, C., Gunter, C. A., Frank, M., Liebovitz, D. & Malin, B., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 100-105 6 p. 6578795. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Distributed non-intrusive load monitoring

Bergman, D. C., Jin, D., Juen, J. P., Tanaka, N., Gunter, C. A. & Wright, A. K., Jun 9 2011, 2011 IEEE PES Innovative Smart Grid Technologies, ISGT 2011. 5759180. (IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enforcing executing-implies-verified with the integrity-aware processor

LeMay, M. & Gunter, C. A., Jan 1 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Balacheff, B., Beres, Y., Sasse, A., McCune, J. M., Perrig, A. & Sadeghi, A-R. (eds.). Springer-Verlag Berlin Heidelberg, p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enforcing executing-implies-verified with the integrity-aware processor

LeMay, M. & Gunter, C. A., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Making DTNs robust against spoofing attacks with localized countermeasures

Uddin, M. Y. S., Khurshid, A., Jung, H. D., Gunter, C., Caesar, M. C. & Abdelzaher, T., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 332-340 9 p. 5984915. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MyABDAC: Compiling XACML policies for attribute-based database access control

Jahid, S., Gunter, C., Hoque, I. & Okhravi, H., Mar 24 2011, CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. p. 97-108 12 p. (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reliable telemetry in white spaces using remote attestation

Fatemieh, O., LeMay, M. & Gunter, C., Dec 1 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 323-332 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Diagnostic powertracing for sensor node failure analysis

Khan, M. M. H., Le, H. K., LeMay, M., Moinzadeh, P., Wang, L., Yang, Y., Noh, D. K., Abdelzaher, T., Gunter, C., Han, J. & Jin, X., Jul 16 2010, Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10. p. 117-128 12 p. (Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Low cost and secure smart meter communications using the TV white spaces

Fatemieh, O., Chandra, R. & Gunter, C. A., Nov 22 2010, Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems. p. 37-42 6 p. 5602162. (Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure collaborative sensing for crowdsourcing spectrum data in white space networks

Fatemieh, O., Chandra, R. & Gunter, C. A., Jun 11 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010. 5457893. (2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

A medical database case study for reflective database access control

Olson, L. E., Gunter, C. A. & Olson, S. P., Dec 1 2009, Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, SPIMACS '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 41-51 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative recommender systems for building automation

LeMay, M., Haas, J. J. & Gunter, C., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755525. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Completeness of discovery protocols

Goodloe, A. E. & Gunter, C. A., Dec 1 2009, Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 29-36 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cumulative attestation kernels for embedded systems

Lemay, M. & Gunter, C. A., Nov 2 2009, Computer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings. p. 655-670 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5789 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How to bootstrap security for ad-hoc network: Revisited

Shin, W., Gunter, C. A., Kiyomoto, S., Fukushima, K. & Tanaka, T., Jan 1 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Gritzalis, D. & Lopez, J. (eds.). Springer New York LLC, p. 119-131 13 p. (IFIP Advances in Information and Communication Technology; vol. 297).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Implementing reflective access control in SQL

Olson, L. E., Gunter, C. A., Cook, W. R. & Winslett, M., Nov 11 2009, Data and Applications Security XXIII - 23rd Annual IFIP WG 11.3 Working Conference, Proceedings. p. 17-32 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5645 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model-checking DoS amplification for VoIP session initiation

Shankesi, R., Alturki, M., Sasse, R., Gunter, C. A. & Meseguer, J., Nov 2 2009, Computer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings. p. 390-405 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5789 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Safety in discretionary access control for logic-based publish-subscribe systems

Minami, K., Borisov, N. & Gunter, C., Nov 30 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 3-12 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security policy implementation strategies for common carrier monitoring service providers

Gunter, C. A., Nov 16 2009, Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009. p. 114-117 4 p. 5197394. (Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sh@re: Negotiated audit in social networks

Gutierrez, A., Godiyal, A., Stockton, M., LeMay, M., Gunter, C. & Campbell, R. H., Dec 1 2009, Proceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009. p. 74-79 6 p. 5346318. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Specifying and analyzing workflows for automated identification and data capture

Gunter, E. L., Yasmeen, A., Gunter, C. A. & Nguyen, A., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755592. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strong and weak policy relations

May, M. J., Gunter, C. A., Lee, I. & Zdancewic, S., 2009, Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009. p. 33-36 4 p. 5197378. (Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Adaptive selective verification

Khanna, S., Venkatesh, S. S., Fatemieh, O., Khan, F. & Gunter, C. A., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1202-1210 9 p. 4509696. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A formal framework for reflective database access control policies

Olson, L. E., Gunter, C. A. & Madhusudan, P., Dec 1 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 289-298 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution