• Publications
  • Influence
Practical robust localization over large-scale 802.11 wireless networks
TLDR
The system is sufficiently robust to enable a variety of location-aware applications without requiring special-purpose hardware or complicated training and calibration procedures, and can be adapted to work with previously unknown user hardware. Expand
Secure routing for structured peer-to-peer overlay networks
TLDR
This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes. Expand
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
TLDR
Quire tracks the call chain of on-device IPCs, allowing an app the choice of operating with the reduced privileges of its callers or exercising its full privilege set by acting explicitly on its own behalf. Expand
Analysis of an electronic voting system
TLDR
It is shown that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software, and that any paperless electronic voting system might suffer similar flaws, despite any certification it could have otherwise received. Expand
AdSplit: Separating Smartphone Advertising from Applications
TLDR
AdSplit is described, where Android is extended to allow an application and its advertising to run as separate processes, under separate user-ids, eliminating the need for applications to request permissions on behalf of their advertising libraries, and providing services to validate the legitimacy of clicks, locally and remotely. Expand
Denial of Service via Algorithmic Complexity Attacks
TLDR
A new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common applications' data structures, and it is shown how modern universal hashing techniques can yield performance comparable to commonplace hash functions while being provably secure against these attacks. Expand
Robotics-Based Location Sensing Using Wireless Ethernet
TLDR
By applying recent advances in probabilistic inference of position and sensor fusion from noisy signals, it is shown that the RF emissions from base stations as measured by off-the-shelf wireless Ethernet cards are sufficiently rich in information to permit a mobile device to reliably track its location. Expand
Robotics-based location sensing using wireless ethernet
TLDR
It is shown that the RF emissions from base stations as measured by off-the-shelf wireless Ethernet cards are sufficiently rich in information to permit a mobile device to reliably track its location. Expand
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
TLDR
Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques, and has the great advantage of an inbuilt PUF error tolerance. Expand
AP3: cooperative, decentralized anonymous communication
TLDR
This paper describes a cooperative overlay network that provides anonymous communication services for participating users and uses AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers. Expand
...
1
2
3
4
5
...