Robust Website Fingerprinting Through the Cache Occupancy Channel

Appeared in: 28th USENIX Security Symposium, 2019

Reverse Engineering IoT Devices: Effective Techniques and Methods

Appeared in: IEEE Internet of Things Journal, Volume 5, Issue 6, 2019

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming

Appeared in: 12th USENIX Workshop on Offensive Technologies (WOOT), 2018

Shattered Trust: When Replacement Smartphone Components Attack

Appeared in: 11th USENIX Workshop on Offensive Technologies--WOOT, 2017

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices

Appeared in: 17th Smart Card Research and Advanced Application Conference (CARDIS 2017), 2017

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts

Appeared in: Workshop on Security for Embedded and Mobile Systems (SEMS 2017), 2017

How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors

Appeared in: 10th USENIX Workshop on Offensive Technologies (WOOT), 2016