2025
A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories.
CoRR, January, 2025
Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World.
CoRR, January, 2025
SoK: On the Offensive Potential of AI.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2025
2024
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking.
CoRR, 2024
A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares.
CoRR, 2024
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications.
CoRR, 2024
Exploiting Leakage in Password Managers via Injection Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Private Hierarchical Governance for Encrypted Messaging.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Injection Attacks Against End-to-End Encrypted Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED.
IACR Cryptol. ePrint Arch., 2023
(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs.
CoRR, 2023
Protecting Autonomous Cars from Phantom Attacks.
Commun. ACM, 2023
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
The Adversarial Implications of Variable-Time Inference.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream.
Sensors, 2022
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
IACR Cryptol. ePrint Arch., 2022
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models.
CoRR, 2022
EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome.
CoRR, 2022
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream.
CoRR, 2022
Optical Speech Recovery From Desktop Speakers.
Computer, 2022
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Proceedings of the 31st USENIX Security Symposium, 2022
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED.
IACR Cryptol. ePrint Arch., 2021
SoK: Security and Privacy in the Age of Commercial Drones.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Game of Drones - Detecting Spying Drones Using Time Domain Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
POSTER: Recovering Songs from a Hanging Light Bulb.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
The Age of Testifying Wearable Devices: The Case of Intoxication Detection.
IACR Cryptol. ePrint Arch., 2020
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations.
IACR Cryptol. ePrint Arch., 2020
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems.
IACR Cryptol. ePrint Arch., 2020
Botnet IND: About Botnets of Botless IoT Devices.
IACR Cryptol. ePrint Arch., 2020
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
MobilBye: Attacking ADAS with Camera Spoofing.
CoRR, 2019
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019
Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Handwritten Signature Verification Using Wrist-Worn Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.
CoRR, 2018
2017
Oops!...I think I scanned a malware.
CoRR, 2017
2016
Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016