Search Results for author: A. Selcuk Uluagac

Found 9 papers, 3 papers with code

SoK: Cryptojacking Malware

1 code implementation5 Mar 2021 Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.

Malware Detection Cryptography and Security

Real-time Analysis of Privacy-(un)aware IoT Applications

no code implementations24 Nov 2019 Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

We designed and built IoTWatcH based on an IoT privacy survey that considers the privacy needs of IoT users.

KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

no code implementations22 Nov 2019 Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.

Cryptography and Security

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

1 code implementation13 Dec 2018 Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.

Cryptography and Security

IoTDots: A Digital Forensics Framework for Smart Environments

no code implementations3 Sep 2018 Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

In order to test the performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors.

Cryptography and Security

Peek-a-Boo: I see your smart home activities, even encrypted!

no code implementations8 Aug 2018 Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac

It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.

Cryptography and Security

Sensitive Information Tracking in Commodity IoT

1 code implementation22 Feb 2018 Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

Through this effort, we introduce a rigorously grounded framework for evaluating the use of sensitive information in IoT apps---and therein provide developers, markets, and consumers a means of identifying potential threats to security and privacy.

Cryptography and Security Programming Languages

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

no code implementations6 Feb 2018 Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.