Publications
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
Appeared in: 30th USENIX Security Symposium, 2021 (to appear)
Sensor Defense In-Software (SDI): Practical Defenses Against Spoofing Attacks on Position Sensors
Appeared in: Engineering Applications of Artificial Intelligence Volume 95, 2020
Can the Operator of a Drone Be Located by Following the Drone’s Path?
Appeared in: 4th International Symposium on Cyber Security Cryptography and Machine Learning, 2020
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
Appeared in: IEEE Transactions on Dependable and Secure Computing, 2020
Cyber Security Threats in the Microbial Genomics Era: Implications for Public Health
Appeared in: Eurosurveillance Volume 25, Issue 6, 2020
Inner Conflict: How Smart Device Components Can Cause Harm
Appeared in: Elsevier Computers & Security, Volume 89, February 2020, 101665
Cross-Router Covert Channels
Appeared in: 13th USENIX Workshop on Offensive Technologies (WOOT), 2019
Cyber Attack on SUUNTO Dive Computer
Appeared in: Technical Report
Robust Website Fingerprinting Through the Cache Occupancy Channel
Appeared in: 28th USENIX Security Symposium, 2019
Reverse Engineering IoT Devices: Effective Techniques and Methods
Appeared in: IEEE Internet of Things Journal, Volume 5, Issue 6, 2019
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming
Appeared in: 12th USENIX Workshop on Offensive Technologies (WOOT), 2018
Brief Announcement: Deriving Context for Touch Events
Appeared in: Second International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018
Shattered Trust: When Replacement Smartphone Components Attack
Appeared in: 11th USENIX Workshop on Offensive Technologies (WOOT), 2017
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices
Appeared in: 17th Smart Card Research and Advanced Application Conference (CARDIS), 2017
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts
Appeared in: Workshop on Security for Embedded and Mobile Systems (SEMS), 2017
The Curious Case of the Curious Case: Detecting touchscreen events using a smartphone protective case
Appeared in: Workshop on Security for Embedded and Mobile Systems (SEMS), 2017
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
Appeared in: 10th USENIX Workshop on Offensive Technologies (WOOT), 2016