Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome Download Publication Artifact Repository

Appeared in: 33rd USENIX Security Symposium, 2024 (to appear)

The Attack Surface of Wet Lab Automation Download Publication

Appeared in: Cyberbiosecurity

The Finger in the Power: How to Fingerprint PCs by Monitoring their Power Consumption Download Publication Artifact Repository

Appeared in: 20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2023

Juliet-PUF: Enhancing the Security of IoT-Based SRAM-PUFs Using the Remanence Decay Effect Download Publication

Appeared in: IEEE Internet of Things Journal Volume 10, Issue 14, July 2023

Characterization and Detection of Cross-Router Covert Channels Download Publication Artifact Repository

Appeared in: Elsevier Computers & Security, January 2023, 103125

HammerScope: Observing DRAM Power Consumption Using Rowhammer Download Publication Artifact Repository

Appeared in: 29th ACM Conference on Computer and Communications Security (CCS), 2022

Port Contention Goes Portable: Port Contention Side Channels in Web Browsers Download Publication Artifact Repository

Appeared in: 17th ACM ASIA Conference on Computer and Communications Security, AsiaCCS 2022

Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel Download Publication

Appeared in: IEEE Access, Volume 10, 2022

Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices Download Publication

Appeared in: Applied Sciences, Volume 12 Issue 1, 2022

DRAWN APART : A Device Identification Technique based on Remote GPU Fingerprinting Download Publication Artifact Repository

Appeared in: 29th Annual Network and Distributed System Security Symposium, NDSS 2022

Cache-based characterization: A low-infrastructure, distributed alternative to network-based traffic and application characterization Download Publication Artifact Repository

Appeared in: Elsevier Computer Networks Volume 200, December 2021

Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality Download Publication Artifact Repository

Appeared in: IEEE Transactions on Dependable and Secure Computing Volume 18, Issue 5, September 2021

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Download Publication Artifact Repository

Appeared in: 30th USENIX Security Symposium, 2021

Sensor Defense In-Software (SDI): Practical Defenses Against Spoofing Attacks on Position Sensors Download Publication

Appeared in: Engineering Applications of Artificial Intelligence Volume 95, 2020

Can the Operator of a Drone Be Located by Following the Drone’s Path? Download Publication

Appeared in: 4th International Symposium on Cyber Security Cryptography and Machine Learning, 2020

Cyber Security Threats in the Microbial Genomics Era: Implications for Public Health Download Publication

Appeared in: Eurosurveillance Volume 25, Issue 6, 2020

Inner Conflict: How Smart Device Components Can Cause Harm Download Publication

Appeared in: Elsevier Computers & Security, Volume 89, February 2020, 101665

Cross-Router Covert Channels Download Publication

Appeared in: 13th USENIX Workshop on Offensive Technologies (WOOT), 2019

Cyber Attack on SUUNTO Dive Computer Download Publication

Appeared in: Technical Report

Robust Website Fingerprinting Through the Cache Occupancy Channel Download Publication Artifact Repository

Appeared in: 28th USENIX Security Symposium, 2019

Reverse Engineering IoT Devices: Effective Techniques and Methods Download Publication

Appeared in: IEEE Internet of Things Journal, Volume 5, Issue 6, 2019

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming Download Publication

Appeared in: 12th USENIX Workshop on Offensive Technologies (WOOT), 2018

Brief Announcement: Deriving Context for Touch Events Download Publication

Appeared in: Second International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018

Shattered Trust: When Replacement Smartphone Components Attack Download Publication

Appeared in: 11th USENIX Workshop on Offensive Technologies (WOOT), 2017

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices Download Publication

Appeared in: 17th Smart Card Research and Advanced Application Conference (CARDIS), 2017

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts Download Publication

Appeared in: Workshop on Security for Embedded and Mobile Systems (SEMS), 2017

The Curious Case of the Curious Case: Detecting touchscreen events using a smartphone protective case Download Publication

Appeared in: Workshop on Security for Embedded and Mobile Systems (SEMS), 2017

How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors Download Publication

Appeared in: 10th USENIX Workshop on Offensive Technologies (WOOT), 2016