Obserwuj
Giuseppe Petracca
Giuseppe Petracca
Zweryfikowany adres z psu.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A survey on sensor-based threats and attacks to smart devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
IEEE Communications Surveys & Tutorials 23 (2), 1125-1159, 2021
3022021
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
922015
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th USENIX security symposium (USENIX Security 17), 379-396, 2017
452017
Adaptive data protection in distributed systems
AC Squicciarini, G Petracca, E Bertino
Proceedings of the third ACM conference on Data and application security and …, 2013
332013
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
262016
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems
YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ...
30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021
212021
Pileus: Protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
212016
A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv 2018
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
arXiv preprint arXiv:1802.02041, 1802
191802
On risk in access control enforcement
G Petracca, F Capobianco, C Skalka, T Jaeger
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
182017
Inevitable failure: The flawed trust assumption in the cloud
Y Sun, G Petracca, T Jaeger
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
132014
Situational awareness through reasoning on network incidents
AC Squicciarini, G Petracca, WG Horne, A Nath
Proceedings of the 4th ACM conference on Data and application security and …, 2014
132014
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
122019
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
122015
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
112017
Agility maneuvers to mitigate inference attacks on sensed location data
G Petracca, LM Marvel, A Swami, T Jaeger
MILCOM 2016-2016 IEEE Military Communications Conference, 259-264, 2016
102016
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
A Atamli, G Petracca, J Crowcroft
Proceedings of the 14th International Conference on Availability …, 2019
72019
Aware: Controlling App Access to I/O Devices on Mobile Platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
72016
Polyscope: Multi-policy access control analysis to triage android scoped storage
YT Lee, H Chen, W Enck, H Vijayakumar, N Li, Z Qian, G Petracca, ...
IEEE Transactions on Dependable and Secure Computing, 2023
62023
h. Aksu, t. Jaeger, AS Uluagac, A survey on sensor-based threats and attacks to smart devices and applications
AK Sikder, G Petracca
IEEE Commun. Surv. Tutor 23, 1125-1159, 2021
62021
Adaptive data management for self-protecting objects in cloud computing systems
AC Squicciarini, G Petracca, E Bertino
2012 8th international conference on network and service management (cnsm …, 2012
62012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20