Comprehensive Experimental Analyses of Automotive Attack Surfaces
- Stephen Checkoway, Damon McCoy, T. Kohno
- Computer ScienceUSENIX Security Symposium
- 8 August 2011
This work discovers that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft.
Defending Against Neural Fake News
- Rowan Zellers, Ari Holtzman, Yejin Choi
- Computer ScienceNeural Information Processing Systems
- 29 May 2019
A model for controllable text generation called Grover, found that best current discriminators can classify neural fake news from real, human-written, news with 73% accuracy, assuming access to a moderate level of training data, and the best defense against Grover turns out to be Grover itself, with 92% accuracy.
Detecting and Defending Against Third-Party Tracking on the Web
- Franziska Roesner, T. Kohno, D. Wetherall
- Computer ScienceSymposium on Networked Systems Design and…
- 25 April 2012
This work develops a client-side method for detecting and classifying five kinds of third-party trackers based on how they manipulate browser state, and finds that no existing browser mechanisms prevent tracking by social media sites via widgets while still allowing those widgets to achieve their utility goals, which leads to a new defense.
Who's In Control?: Interactions In Multi-User Smart Homes
- Christine Geeng, Franziska Roesner
- Computer ScienceInternational Conference on Human Factors in…
- 2 May 2019
An outsized role of the person who installs devices in terms of selecting, controlling, and fixing them; negotiations between parents and children; and minimally voiced privacy concerns among co-occupants are observed.
End User Security and Privacy Concerns with Smart Homes
- Eric Zeng, Shrirang Mare, Franziska Roesner
- Computer ScienceSymposium On Usable Privacy and Security
- 2017
G gaps in threat models arising from limited technical understanding of smart homes, awareness of some security issues but limited concern, ad hoc mitigation strategies, and a mismatch between the concerns and power of the smart home administrator and other people in the home are identified.
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
- Franziska Roesner, T. Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 May 2012
This paper takes the approach of user-driven access control, whereby permission granting is built into existing user actions in the context of an application, rather than added as an afterthought via manifests or system prompts.
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
- Ada Lerner, A. K. Simpson, T. Kohno, Franziska Roesner
- Computer ScienceUSENIX Security Symposium
- 2016
It is argued that an understanding of the ecosystem’s historical trends is important to any technical and policy discussions surrounding tracking and that third-party tracking on the web has increased in prevalence and complexity since the first third- party tracker was observed in 1996.
Security and privacy for augmented reality systems
- Franziska Roesner, T. Kohno, D. Molnar
- Computer ScienceCommunications of the ACM
- 1 April 2014
AR systems pose potential security concerns that should be addressed before the systems become widespread, and these concerns are addressed before they become widespread.
Experimental Security Analysis of a Modern Automobile
- Karl Koscher, Alexei Czeskis, S. Savage
- Computer ScienceIEEE Symposium on Security and Privacy
- 16 May 2010
It is demonstrated that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems and present composite attacks that leverage individual weaknesses.
Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys
- Emily McReynolds, S. Hubbard, Timothy Lau, Aditya Saraf, M. Cakmak, Franziska Roesner
- PsychologyInternational Conference on Human Factors in…
- 2 May 2017
It is found that children were often unaware that others might be able to hear what was said to the toy, and that some parents draw connections between the toys and similar tools not intended as toys with which their children already interact.
...
...