Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and secure distributed read-only file system, , and . ACM Trans. Comput. Syst., 20 (1): 1--24 (2002)Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing., , , , and . CoRR, (2022)WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks., , , , and . EuroS&P, page 3-18. IEEE, (2017)Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images., , , , , , , , , and . RAID, page 32-45. ACM, (2023)Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing., , , and . SpaceSec, The Internet Society, (2023)Ekho: bridging the gap between simulation and reality in tiny energy-harvesting sensors., , , and . HotPower@SOSP, page 9:1-9:5. ACM, (2011)Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses., , , , , and . SP, page 1857-1874. IEEE, (2023)Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision., , , , , , and . SP, page 160-175. IEEE, (2021)SoK: A Minimalist Approach to Formalizing Analog Sensor Security., , , , , and . SP, page 233-248. IEEE, (2020)VeriMask: Facilitating Decontamination of N95 Masks in the COVID-19 Pandemic: Challenges, Lessons Learned, and Safeguarding the Future., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (3): 119:1-119:29 (2021)