1 code implementation • 5 Mar 2021 • Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk
Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.
Malware Detection
Cryptography and Security
no code implementations • 22 Nov 2019 • Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac
Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.
Cryptography and Security
no code implementations • 3 Sep 2018 • Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac
In order to test the performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors.
Cryptography and Security
no code implementations • 8 Aug 2018 • Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac
It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.
Cryptography and Security