Search Results for author: Hidayet Aksu

Found 5 papers, 2 papers with code

KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

no code implementations22 Nov 2019 Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.

Cryptography and Security

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

1 code implementation13 Dec 2018 Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.

Cryptography and Security

Peek-a-Boo: I see your smart home activities, even encrypted!

no code implementations8 Aug 2018 Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac

It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.

Cryptography and Security

Sensitive Information Tracking in Commodity IoT

1 code implementation22 Feb 2018 Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

Through this effort, we introduce a rigorously grounded framework for evaluating the use of sensitive information in IoT apps---and therein provide developers, markets, and consumers a means of identifying potential threats to security and privacy.

Cryptography and Security Programming Languages

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

no code implementations6 Feb 2018 Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.