Folgen
Giuseppe Petracca
Giuseppe Petracca
Bestätigte E-Mail-Adresse bei psu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey on sensor-based threats to internet-of-things (iot) devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
arXiv preprint arXiv:1802.02041, 2018
1722018
A survey on sensor-based threats and attacks to smart devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
IEEE Communications Surveys & Tutorials 23 (2), 1125-1159, 2021
1012021
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
912015
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th USENIX security symposium (USENIX Security 17), 379-396, 2017
412017
Adaptive data protection in distributed systems
AC Squicciarini, G Petracca, E Bertino
Proceedings of the third ACM conference on Data and application security and …, 2013
322013
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
232016
Pileus: Protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
202016
A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv 2018
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
arXiv preprint arXiv:1802.02041, 1802
191802
On risk in access control enforcement
G Petracca, F Capobianco, C Skalka, T Jaeger
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
172017
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems
YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ...
30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021
142021
Inevitable failure: The flawed trust assumption in the cloud
Y Sun, G Petracca, T Jaeger
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
132014
Situational awareness through reasoning on network incidents
AC Squicciarini, G Petracca, WG Horne, A Nath
Proceedings of the 4th ACM conference on Data and application security and …, 2014
132014
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
122015
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
112019
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
102017
Agility maneuvers to mitigate inference attacks on sensed location data
G Petracca, LM Marvel, A Swami, T Jaeger
MILCOM 2016-2016 IEEE Military Communications Conference, 259-264, 2016
102016
Aware: Controlling App Access to I/O Devices on Mobile Platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
82016
Adaptive data management for self-protecting objects in cloud computing systems
AC Squicciarini, G Petracca, E Bertino
2012 8th international conference on network and service management (cnsm …, 2012
62012
Early detection of policies violations in a social media site: A bayesian belief network approach
AC Squicciarini, W McGill, G Petracca, S Huang
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
62012
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications (2018)
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
ArXiv abs, 1802
61802
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20