SPQR LaboratorySecurity and Privacy Research Lab

Department of Computer Science
University of Massachusetts Amherst

Note: You may prefer to view the fancy dynamic version of this page.
[KFGR15]
David Kotz, Kevin Fu, Carl Gunter, and Avi Rubin. Security for mobile and cloud frontiers in healthcare. Communications of the ACM, 58(8):21–23, July 2015. [ bib | http ]
[RHHF15]
Amir Rahmati, Matthew Hicks, Daniel E. Holcomb, and Kevin Fu. Probable cause: The deanonymizing effects of approximate DRAM. In Proceedings of the 42nd International Symposium of Computer Architecture (ISCA), Portland, OR, June 2015. [ bib ]
[LRH+14]
E.A. Lee, J. Rabaey, B. Hartmann, J. Kubiatowicz, K. Pister, A. Sangiovanni-Vincentelli, S.A. Seshia, J. Wawrzynek, D. Wessel, T.S. Rosing, D. Blaauw, P. Dutta, K. Fu, C. Guestrin, B. Taskar, R. Jafari, D. Jones, V. Kumar, R. Mangharam, G.J. Pappas, R.M. Murray, and A. Rowe. The swarm at the edge of the cloud. Design Test, IEEE, 31(3):8–20, June 2014. [ bib | .pdf ]
Keywords:
[HSKS15]
Matthew Hicks, Cynthia Sturton, Samuel T. King, and Jonathan M. Smith. SPECS: A lightweight runtime mechanism for protecting software from security-critical processor bugs. In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ASPLOS '15, March 2015. [ bib | .pdf ]
Keywords: Security, Hardware, Architecture
[HF14a]
Daniel E Holcomb and Kevin Fu. Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. In Lejla Batina and Matthew Robshaw, editors, Cryptographic Hardware and Embedded Systems (CHES 2014), volume 8731 of Lecture Notes in Computer Science, pages 510–526, September 2014. [ bib | .pdf ]
Keywords: PUF, Security, Hardware, Circuits
[HF14b]
Daniel E. Holcomb and Kevin Fu. QBF-based synthesis of optimal word-splitting in approximate multi-level storage cells. In Workshop on Approximate Computing Across the System Stack (WACAS), Salt Lake City, UT, March 2014. [ bib | .pdf ]
Keywords: Hardware, Approximate Storage, QBF, Flash, MLC
[RFKSR14]
Michael Rushanan, Denis Foo Kune, Colleen M. Swanson, and Aviel D. Rubin. Sok: Security and privacy in implantable medical devices and body area networks. In Proceedings of the 35th Annual IEEE Symposium on Security and Privacy, May 2014. [ bib | .pdf ]
Keywords: Security, Privacy, Health
[RHHF14]
Amir Rahmati, Matthew Hicks, Daniel E. Holcomb, and Kevin Fu. Refreshing thoughts on DRAM: Power saving vs. data integrity. In Workshop on Approximate Computing Across the System Stack (WACAS), Salt Lake City, UT, March 2014. [ bib | .pdf ]
Keywords: Hardware, DRAM
[RH14]
Ulrich Ruhrmair and Daniel E. Holcomb. PUFs at a Glance. In Proceedings of Design Automation and Test in Europe (DATE '14), March 2014. [ bib | .pdf ]
Keywords: Hardware, PUF
[GWFK+14]
Younghwan Go, Jongil Won, Denis Foo Kune, EunYoung Jeong, Yongdae Kim, and KyoungSoo Park. Gaining control of cellular traffic accounting by spurious tcp retransmission. In In Proceedings of the Network and Distributed System Security Symposium, February 2014. [ bib ]
Keywords: Wireless, Mobile, Networking
[FB13]
Kevin Fu and James Blum. Inside risks: Controlling for cybersecurity risks of medical device software. Communications of the ACM, 56(10):21–23, October 2013. [ bib | .pdf ]
Keywords: Health, Security, Privacy
[Fu12]
Kevin Fu. On the expectations of smart cards to reduce Medicare fraud, November 2012. Testimony to the Subcommittee on Health, Committee on Energy and Commerce, United States House of Representatives, Hearing on Examining Options to Combat Health Care Waste, Fraud and Abuses, Wednesday, November 28, 2012. [ bib | .pdf ]
Keywords: Health, Security
[FKBC+13]
Denis Foo Kune, John Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the 34th Annual IEEE Symposium on Security and Privacy, May 2013. [ bib | .pdf ]
Keywords: Security, Privacy, Health, EMI
[GFKPK13]
Younghwan Go, Denis Foo Kune, KyoungSoo Park, and Yongdae Kim. Towards accurate accounting of cellular data for tcp retransmission. In Fourteenth Workshop on Mobile Computing Systems and Applications (ACM HotMobile 2013), February 2013. [ bib ]
Keywords: Wireless, Mobile, Networking
[Sal12]
Mastooreh Salajegheh. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. PhD thesis, University of Massachusetts Amherst, September 2012. [ bib | .pdf ]
Keywords: Thesis, Probabilistic Storage, Power Management
[CRS+12]
Shane S. Clark, Benjamin Ransford, Jacob Sorber, Wenyuan Xu, Erik Learned-Miller, and Kevin Fu. Current Events: Identifying webpages by tapping the electrical outlet. Technical Report UM-CS-2011-030, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, July 2012. [ bib | http ]
Keywords: Side Channels, Privacy, Power Analysis
[MMDF+12]
Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, and David Irwin. Designing privacy-preserving smart meters with low-cost microcontrollers. In Proceedings of the 16th International Conference on Financial Cryptography and Data Security, FC '12, February 2012. [ bib | .pdf ]
Keywords: Privacy-preserving, Microcontrollers, Zero-knowledge, Meters
[CF11]
Shane S. Clark and Kevin Fu. Recent results in computer security for medical devices. In International ICST Conference on Wireless Mobile Communication and Healthcare (MobiHealth), Special Session on Advances in Wireless Implanted Devices, October 2011. [ bib | .pdf ]
Keywords: Security, Health
[SWJ+13]
Mastooreh Salajegheh, Yue Wang, Anxiao (Andrew) Jiang, Erik Learned-Miller, and Kevin Fu. Half-wits: Software techniques for low-voltage probabilistic storage on microcontrollers with NOR flash memory. ACM Transactions on Embedded Computing Systems, Special Issue on Probabilistic Embedded Computing, 12(2s), May 2013. [ bib | .pdf ]
Keywords: Probabilistic Storage, Power Management, Journal Paper
[ZSFS11]
Hong Zhang, Mastooreh Salajegheh, Kevin Fu, and Jacob Sorber. Ekho: Bridging the gap between simulation and reality in tiny energy-harvesting sensors. In Workshop on Power Aware Computing and Systems (HotPower 2011), October 2011. [ bib | .pdf ]
Keywords: RFID, Power Management, Hardware
[HRMM+11]
Steve Hanna, Rolf Rolles, Andres Molina-Markham, Pongsin Poosankam, Kevin Fu, and Dawn Song. Take two software updates and see me in the morning: The case for software security evaluations of medical devices. In Proceedings of 2nd USENIX Workshop on Health Security and Privacy (HealthSec), August 2011. [ bib | .pdf ]
Keywords: Security, Health
[GHR+11]
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. They can hear your heartbeats: Non-invasive security for implanted medical devices. In Proceedings of ACM SIGCOMM, August 2011. [ bib | .pdf ]
Keywords: Wireless, Health, Security, Award Paper
[Fu11a]
Kevin Fu. Software issues for the medical device approval process, April 2011. Statement to the Special Committee on Aging, United States Senate, Hearing on a delicate balance: FDA and the reform of the medical device approval process, Wednesday, April 13, 2011. [ bib | .pdf ]
Keywords: Health, Security
[SWF+11]
Mastooreh Salajegheh, Yue Wang, Kevin Fu, Anxiao (Andrew) Jiang, and Erik Learned-Miller. Exploiting half-wits: Smarter storage for low-power devices. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST '11), San Jose, CA, February 2011. [ bib | .pdf ]
Keywords: Probabilistic Storage, Power Management
[CSY+12]
Hee-Jin Chae, Mastooreh Salajegheh, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu. Wirelessly Powered Sensor Networks and Computational RFID, chapter Maximalist Cryptography and Computation on the WISP UHF RFID Tag. Springer, 2012. An earlier version based on older WISP technology appeared in RFIDSec07. [ bib | http ]
Keywords: RFID, Crypto, Security
[Fu11b]
Kevin Fu. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report, Washington, DC, July 2011. IOM (Institute of Medicine), National Academies Press. [ bib | .pdf ]
Keywords: Health
[RSF10]
Benjamin Ransford, Jacob Sorber, and Kevin Fu. Mementos: System support for long-running computation on rfid-scale devices (technical report). Technical Report UM-CS-2010-060, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, October 2010. [ bib | http ]
Keywords: RFID, Operating Systems, Mementos
[RSF11]
Benjamin Ransford, Jacob Sorber, and Kevin Fu. Mementos: System support for long-running computation on RFID-scale devices. In Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '11, Newport Beach, CA, March 2011. [ bib | .pdf ]
Keywords: RFID, Power Management, Operating Systems, UMass Moo, Mementos
[MMSF+10]
Andres Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. Private memoirs of a smart meter. In 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010), Zurich, Switzerland, November 2010. [ bib | .pdf ]
Keywords: Power Management, Privacy, Meters
[DSFI08]
Benessa Defend, Mastooreh Salajegheh, Kevin Fu, and Sozo Inoue. Protecting global medical telemetry infrastructure. Technical report, Institute of Information Infrastructure Protection (I3P), January 2008. [ bib | .pdf ]
Keywords: Security, Health
[GCFG10]
Jeremy Gummeson, Shane S. Clark, Kevin Fu, and Deepak Ganesan. On the limits of effective micro-energy harvesting on mobile CRFID sensors. In Proceedings of 8th Annual ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), pages 195–208, June 2010. [ bib | .pdf ]
Keywords: RFID, Power Management, UMass Moo
[MSF09]
Andres D. Molina, Mastooreh Salajegheh, and Kevin Fu. HICCUPS: Health information collaborative collection using privacy and security. In Proceedings of the Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS), pages 21–30. ACM Press, November 2009. [ bib | DOI | http ]
Keywords: Crypto, Health, Security, Privacy
[LFK+09]
Sinjin Lee, Kevin Fu, Tadayoshi Kohno, Benjamin Ransford, and William H. Maisel. Clinically significant magnetic interference of implanted cardiac devices by portable headphones. Heart Rhythm Journal, 6(10):1432–1436, October 2009. [ bib | .pdf ]
Keywords: Health, Journal Paper
[CGFG09]
Shane S. Clark, Jeremy Gummeson, Kevin Fu, and Deepak Ganesan. Towards autonomously-powered CRFIDs. In Workshop on Power Aware Computing and Systems (HotPower 2009), October 2009. [ bib | .pdf ]
Keywords: RFID, Power Management
[Fu09]
Kevin Fu. Inside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Communications of the ACM, 52(6):25–27, June 2009. [ bib ]
Keywords: Health, Security, Privacy
[SCR+09]
Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, and Ari Juels. CCCP: secure remote storage for computational RFIDs. In Proceedings of the 18th USENIX Security Symposium, pages 215–230, Montreal, Canada, August 2009. [ bib | .pdf ]
Keywords: Security, Privacy, RFID, Crypto
[SMF09]
Mastooreh Salajegheh, Andres Molina, and Kevin Fu. Privacy of home telemedicine: Encryption is not enough. Journal of Medical Devices, 3(2), April 2009. Design of Medical Devices Conference Abstracts. [ bib | DOI | .pdf ]
Keywords: Health, Security
[LRF+08]
Sinjin Lee, Benjamin Ransford, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. Electromagnetic interference (EMI) of implanted cardiac devices by MP3 player headphones. Circulation, 118(18 Supplement), November 2008. Abstract 662, 2008 American Heart Association Annual Scientific Sessions. [ bib ]
Keywords: Health, Journal Paper
[HBF09]
Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers, 58(9):1198–1210, September 2009. [ bib | .pdf ]
Keywords: Security, RFID, Crypto, Journal Paper
[RCSF08]
Benjamin Ransford, Shane S. Clark, Mastooreh Salajegheh, and Kevin Fu. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. In USENIX Workshop on Power Aware Computing and Systems (HotPower), December 2008. [ bib | .pdf ]
Keywords: Power Management, RFID, Mementos
[DFK08]
Tamara Denning, Kevin Fu, and Tadayoshi Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec), July 2008. [ bib | .pdf ]
Keywords: Security, Health
[HHBR+08]
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 29th Annual IEEE Symposium on Security and Privacy, pages 129–142, May 2008. [ bib | .pdf ]
Keywords: Security, Privacy, Health, Award Paper
[HHBF+08]
Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. Security and privacy for implantable medical devices. IEEE Pervasive Computing, Special Issue on Implantable Electronics, 7(1):30–39, January 2008. [ bib | DOI | .pdf ]
Keywords: Security, Health, Journal Paper
[HBF07]
Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proceedings of the Conference on RFID Security, July 2007. [ bib | .pdf ]
Keywords: RFID, Crypto, Security
[CYSF07]
Hee-Jin Chae, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu. Maximalist cryptography and computation on the WISP UHF RFID tag. In Proceedings of the Conference on RFID Security, July 2007. [ bib | .pdf ]
Keywords: RFID, Crypto, Security
[DFJ07]
Benessa Defend, Kevin Fu, and Ari Juels. Cryptanalysis of two lightweight RFID authentication schemes. In Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) Workshop, March 2007. [ bib | .pdf ]
Keywords: RFID, Crypto, Security
[HBBF+07]
Thomas S. Heydt-Benjamin, Dan V. Bailey, Kevin Fu, Ari Juels, and Tom OHare. Vulnerabilities in first-generation RFID-enabled credit cards. In Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, Vol. 4886, pages 2–14, Lowlands, Scarborough, Trinidad/Tobago, February 2007. [ bib | .pdf ]
Keywords: Security, RFID
[SF01]
Emil Sit and Kevin Fu. Inside risks, web cookies: Not just a privacy risk. Communications of the ACM, 44(9):120, September 2001. [ bib ]
Keywords: Security, Crypto, Cookies
[AFGH05]
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC, February 2005. [ bib | .pdf ]
Keywords: Security
[RBF97]
Aviel D. Rubin, Dan Boneh, and Kevin Fu. Revocation of unread email in an untrusted network. In Proceedings of Information Security and Privacy, Second Australasian Conference (ACISP), Springer-Verlag, Lecture Notes in Computer Science, Vol. 1270, pages 62–75, Sydney, Australia, July 1997. [ bib | .pdf ]
Keywords: Security, Crypto
[GF99]
Richard Graveman and Kevin Fu. Approximate message authentication codes. Technical report, Bellcore, February 1999. Army Research Labs ATIRP. [ bib | .pdf ]
Keywords: Security, Crypto, Tech Report
[FKM02b]
Kevin Fu, Michael Kaminsky, and David Mazieres. Using SFS for a secure network file system. ;login: The Magazine of Usenix & Sage, 27(6):6–16, December 2002. [ bib | .pdf ]
Keywords: Security, Operating Systems
[BBF06]
Anthony Bellissimo, John Burgess, and Kevin Fu. Secure software updates: disappointments and new challenges. In Proceedings of USENIX Hot Topics in Security (HotSec), July 2006. [ bib | .pdf ]
Keywords: Security
[HBCDF06]
Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu. Privacy for public transportation. In Proceedings of Privacy Enhancing Technologies workshop (PET 2006), Lecture Notes in Computer Science, Vol. 4258, pages 1–19, June 2006. [ bib | .pdf ]
Keywords: Security, Anonymity, RFID
[FKK06]
Kevin Fu, Seny Kamara, and Tadayoshi Kohno. Key regression: Enabling efficient key distribution for secure distributed storage. In Proceedings of the Symposium on Network and Distributed Systems Security, February 2006. [ bib | .pdf ]
Keywords: Security, Crypto, Operating Systems
[AFGH06]
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC), 9(1), February 2006. An early version appeared in Proceedings of the Network and Distributed Systems Security Symposium (2005). [ bib | .pdf ]
Keywords: Security, Crypto, Operating Systems, Journal Paper
[Fu99]
Kevin Fu. Group sharing and random access in cryptographic storage file systems. Master's thesis, Massachusetts Institute of Technology, May 1999. [ bib | .pdf ]
Keywords: Security, Crypto, Operating Systems, Thesis
[FSSF01a]
Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster. Dos and don'ts of client authentication on the web. Technical Report MIT-LCS-TR-818, MIT Lab for Computer Science, May 2001. [ bib | .pdf ]
Keywords: Security, Crypto, Tech Report, Cookies
[FKM02a]
Kevin Fu, M. Frans Kaashoek, and David Mazieres. Fast and secure distributed read-only file system. ACM Transactions on Computer Systems, 20(1):1–24, February 2002. [ bib | .pdf ]
Keywords: Security, Operating Systems, Journal Paper
[FKM00]
Kevin Fu, M. Frans Kaashoek, and David Mazieres. Fast and secure distributed read-only file system. In Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2000), pages 181–196, San Diego, California, October 2000. [ bib | .pdf ]
Keywords: Security, Operating Systems
[Fu05]
Kevin Fu. Integrity and access control in untrusted content distribution networks. PhD thesis, MIT, September 2005. [ bib | .pdf ]
Keywords: Security, Crypto, Operating Systems, Thesis
[KPG+04]
Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazieres, and M. Frans Kaashoek. REX: Secure, extensible remote execution. In Proceedings of the 2004 USENIX Annual Technical Conference (USENIX '04), pages 199–212, Boston, Massachusetts, June 2004. [ bib | .pdf ]
Keywords: Security, Operating Systems
[FSSF01b]
Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award). [ bib | .pdf ]
Keywords: Security, Crypto, Award Paper, Cookies
[KRS+03]
Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, and Kevin Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. USENIX Conference on File and Storage Technologies, pages 29–42, San Francisco, CA, December 2003. [ bib | .pdf ]
Keywords: Security, Operating Systems
[ZGRF11]
Hong Zhang, Jeremy Gummeson, Benjamin Ransford, and Kevin Fu. Moo: A batteryless computational RFID and sensing platform. Technical Report UM-CS-2011-020, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, June 2011. [ bib | http ]
Keywords: RFID, Hardware, UMass Moo
[Ran10]
Benjamin Ransford. A rudimentary bootloader for computational RFIDs. Technical Report UM-CS-2010-061, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, April 2010. [ bib | http ]
Keywords: RFID, Operating Systems
[BCRF12]
Wayne P. Burleson, Shane S. Clark, Benjamin Ransford, and Kevin Fu. Design challenges for secure implantable medical devices. In Proceedings of the 49th Design Automation Conference, DAC '12, June 2012. Invited paper. [ bib | .pdf ]
Keywords: Security, Health
[RSH+12b]
Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, and Kevin Fu. TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks. In Proceedings of the 21st USENIX Security Symposium, Security '12, Bellevue, WA, August 2012. [ bib | .pdf ]
Keywords: Security, Privacy, RFID
[RSH+12a]
Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, and Kevin Fu. Tardis: Secure time keeping for embedded devices without clocks. In Poster and Short Talk session of 33rd Annual IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012. [ bib | .pdf ]
Keywords: Security, Privacy, RFID
[HRS+12]
Dan Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, and Kevin Fu. Drv-fingerprinting: Using data retention voltage of sram cells for chip identification. In The 8th Workshop On RFID Security And Privacy, RFIDSec '12, Nijmegen, The Netherlands, July 2012. [ bib | .pdf ]
Keywords: Security, RFID, PUF
[KBR+12]
Daniel B. Kramer, Matthew Baker, Benjamin Ransford, Andres Molina-Markham, Quinn Stewart, Kevin Fu, and Matthew R. Reynolds. Security and privacy qualities of medical devices: An analysis of FDA postmarket surveillance. PLoS ONE, 7(7):e40200, July 2012. [ bib | http ]
Keywords: Security, Health
[CRF12]
Shane S. Clark, Benjamin Ransford, and Kevin Fu. Potentia est scientia: Security and privacy implications of energy-proportional computing. In Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12, Bellevue, WA, August 2012. [ bib | .pdf ]
Keywords: Security, Privacy, Power, Medical Device, Malware, Power Analysis
[WCL12]
Robert J. Walls, Shane S. Clark, and Brian Neil Levine. Functional privacy or why cookies are better with milk. In Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12, Bellevue, WA, August 2012. [ bib | .pdf ]
Keywords: Cookies, Privacy
[MMCRF12]
Andres Molina-Markham, Shane S. Clark, Benjamin Ransford, and Kevin Fu. Wirelessly Powered Sensor Networks and Computational RFID, chapter BAT: Backscatter Anything-to-Tag Communication. Springer, 2012. [ bib | http ]
Keywords: RFID, Networking
[MM12]
Andres Molina-Markham. Privacy-aware Collaboration Among Untrusted Resource Constrained Devices. PhD thesis, University of Massachusetts Amherst, September 2012. [ bib | .pdf ]
Keywords: Privacy, Security, Crypto, Distributed Systems, Thesis
[Ran13]
Benjamin Ransford. Transiently Powered Computers. PhD thesis, University of Massachusetts Amherst, January 2013. [ bib | .pdf ]
Keywords: Thesis, Mementos, Medical Device, RFID, Power Management, Operating Systems, UMass Moo
[Cla13]
Shane S. Clark. The Security and Privacy Implications of Energy-Proportional Computing. PhD thesis, University of Massachusetts Amherst, September 2013. [ bib | .pdf ]
Keywords: Thesis, Security, Privacy, Power Analysis, Health, Medical Device
[CMR+13]
Shane S. Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, and Wenyuan Xu. Current Events: Identifying webpages by tapping the electrical outlet. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), September 2013. [ bib | .pdf ]
Keywords: Side Channels, Privacy, Power Analysis
[CRR+13]
Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In USENIX Workshop on Health Information Technologies, August 2013. [ bib | .pdf ]
Keywords: Security, Health, Power Analysis

This file was generated by bibtex2html 1.96.