Search Results for author: Abbas Acar

Found 4 papers, 1 papers with code

SoK: Cryptojacking Malware

1 code implementation5 Mar 2021 Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.

Malware Detection Cryptography and Security

KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

no code implementations22 Nov 2019 Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.

Cryptography and Security

IoTDots: A Digital Forensics Framework for Smart Environments

no code implementations3 Sep 2018 Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

In order to test the performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors.

Cryptography and Security

Peek-a-Boo: I see your smart home activities, even encrypted!

no code implementations8 Aug 2018 Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac

It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.