Muslum Ozgur Ozmen

Orcid: 0000-0002-5696-8964

According to our database1, Muslum Ozgur Ozmen authored at least 34 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physical Side-Channel Attacks against Intermittent Devices.
Proc. Priv. Enhancing Technol., 2024

Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks.
CoRR, 2024

SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Systematic Study of Physical Sensor Attack Hardness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

ZBCAN: A Zero-Byte CAN Defense System.
Proceedings of the 32nd USENIX Security Symposium, 2023

PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evasion Attacks and Defenses on Smart Home Physical Event Verification.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices.
IEEE Trans. Serv. Comput., 2022

Behind the Tube: Exploitative Monetization of Content on YouTube.
Proceedings of the 31st USENIX Security Symposium, 2022

PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Discovering IoT Physical Channel Vulnerabilities.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Discovering Physical Interaction Vulnerabilities in IoT Deployments.
CoRR, 2021

On the Safety Implications of Misordered Events and Commands in IoT Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives.
IEEE Trans. Dependable Secur. Comput., 2020

Lattice-Based Proof-of-Work for Post-Quantum Blockchains.
IACR Cryptol. ePrint Arch., 2020

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT.
Proceedings of the Information Security - 23rd International Conference, 2020

Compact and Resilient Cryptographic Tools for Digital Forensics.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.
Proc. Priv. Enhancing Technol., 2019

IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones.
CoRR, 2019

ARIS: Authentication for Real-Time IoT Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Energy-Aware Digital Signatures for Embedded Medical Devices.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Fast Authentication from Aggregate Signatures with Improved Security.
IACR Cryptol. ePrint Arch., 2018

Compact Energy and Delay-aware Authentication.
IACR Cryptol. ePrint Arch., 2018

TACHYON: Fast Signatures from Compact Knapsack.
IACR Cryptol. ePrint Arch., 2018

Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2017
Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones.
IACR Cryptol. ePrint Arch., 2017

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Public Key Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2017

High-Speed High-Security Public Key Encryption with Keyword Search.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017


  Loading...