Kevin Fu
Orcid: 0000-0002-5770-6421Affiliations:
- University of Michigan, Ann Arbor, MI, USA
- University of Massachusetts Amherst, USA (former)
According to our database1,
Kevin Fu
authored at least 88 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2022, "For contributions to computer security, and especially to the secure engineering of medical devices".
IEEE Fellow
IEEE Fellow 2018, "For contributions to embedded and medical device security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.umass.edu
On csauthors.net:
Bibliography
2025
Learning Flexible Heterogeneous Coordination with Capability-Aware Shared Hypernetworks.
CoRR, January, 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Generalization of Heterogeneous Multi-Robot Policies via Awareness and Communication of Capabilities.
Proceedings of the Conference on Robot Learning, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
GetMobile Mob. Comput. Commun., 2022
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022
Proceedings of the 2022 New Security Paradigms Workshop, 2022
2021
VeriMask: Facilitating Decontamination of N95 Masks in the COVID-19 Pandemic: Challenges, Lessons Learned, and Safeguarding the Future.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification.
CoRR, 2021
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects.
Proceedings of the 2021 IEEE Sensors, Sydney, Australia, October 31 - Nov. 3, 2021, 2021
2020
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Automating decontamination of N95 masks for frontline workers in COVID-19 pandemic: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
2019
Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control Systems.
CoRR, 2019
Comput. Biol. Medicine, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
2017
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Half-Wits: Software Techniques for Low-Voltage Probabilistic Storage on Microcontrollers with NOR Flash Memory.
ACM Trans. Embed. Comput. Syst., 2013
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Ekho: bridging the gap between simulation and reality in tiny energy-harvesting sensors.
Proceedings of the 4th Workshop on Power-Aware Computing and Systems, 2011
They can hear your heartbeats: non-invasive security for implantable medical devices.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Proceedings of the Wireless Mobile Communication and Healthcare, 2011
Proceedings of the 9th USENIX Conference on File and Storage Technologies, 2011
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011
2010
Proceedings of the 8th International Conference on Mobile Systems, 2010
2009
IEEE Trans. Computers, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
2008
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling.
Proceedings of the Workshop on Power Aware Computing and Systems, 2008
2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
PhD thesis, 2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004
2003
Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31, 2003
2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
2000
1999
1998
1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997