no code implementations • 14 Feb 2024 • Michael Shaham, Risha Ranjan, Engin Kirda, Taskin Padir
Autonomous vehicle platoons present near- and long-term opportunities to enhance operational efficiencies and save lives.
1 code implementation • International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment 2021 • Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz
In response to such attacks, both academia and industry have investigated techniques to model and reconstruct these attacks and to defend against them.
1 code implementation • 5 Mar 2021 • Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk
Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.
Malware Detection
Cryptography and Security
1 code implementation • 3 Jul 2020 • Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William Robertson
We present DICE, a drop-in solution for firmware analyzers to emulate DMA input channels and generate or manipulate DMA inputs.
Cryptography and Security
no code implementations • 22 Nov 2019 • Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac
Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server.
Cryptography and Security