1 code implementation • 5 Mar 2021 • Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk
Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.
Malware Detection
Cryptography and Security
no code implementations • 7 Oct 2020 • AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac
In this paper, we introduce a new type of adversarial attacks to exploit the ML classifiers used in a SHS.
no code implementations • 24 Nov 2019 • Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac
We designed and built IoTWatcH based on an IoT privacy survey that considers the privacy needs of IoT users.
no code implementations • 22 Nov 2019 • Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac
Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.
Cryptography and Security
1 code implementation • 13 Dec 2018 • Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya
Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.
Cryptography and Security
no code implementations • 3 Sep 2018 • Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac
In order to test the performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors.
Cryptography and Security
no code implementations • 8 Aug 2018 • Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac
It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.
Cryptography and Security
1 code implementation • 22 Feb 2018 • Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
Through this effort, we introduce a rigorously grounded framework for evaluating the use of sensitive information in IoT apps---and therein provide developers, markets, and consumers a means of identifying potential threats to security and privacy.
Cryptography and Security Programming Languages
no code implementations • 6 Feb 2018 • Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac
Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices.
Cryptography and Security