Shishir Nagaraja

Orcid: 0000-0001-7272-0611

According to our database1, Shishir Nagaraja authored at least 56 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024

2023
Sensor Identification via Acoustic Physically Unclonable Function.
DTRAP, 2023

SoK: Acoustic Side Channels.
CoRR, 2023

AGRITRUST: A Testbed to Enable Trustworthy Smart AgriTech.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

SWaP: A Water Process Testbed for ICS Security Research.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2022
Fingerprinting Robot Movements via Acoustic Side Channel.
CoRR, 2022

Reconstructing Robot Operations via Radio-Frequency Side-Channel.
CoRR, 2022

The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act.
CoRR, 2022

YASM (Yet Another Surveillance Mechanism).
CoRR, 2022

The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act.
CoRR, 2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022

When is Software a Medical Device? Understanding and Determining the 'Intention' and Requirements for Software as a Medical device in EU law.
CoRR, 2022

Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and EU law perspective.
Comput. Law Secur. Rev., 2022

Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Preventing or Mitigating Adversarial Supply Chain Attacks: A Legal Analysis.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

2021
VoIPLoc: passive VoIP call provenance via acoustic side-channels.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and European law perspective.
CoRR, 2020

Unlinking super-linkers: the topology of epidemic response (Covid-19).
CoRR, 2020

A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
VoipLoc: Establishing VoIP call provenance using acoustic side-channels.
CoRR, 2019

Privacy with Surgical Robotics: Challenges in Applying Contextual Privacy Theory.
CoRR, 2019

Secure Calibration for High-Assurance IoT: Traceability for Safety Resilience.
CoRR, 2019

A game-theoretic analysis of DoS attacks on driverless vehicles.
CoRR, 2019

An Access Control Model for Robot Calibration.
CoRR, 2019

Clicktok: click fraud detection using traffic analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Poster: Unified Access Control for Surgical Robotics.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Do we have the time for IRM?: service denial attacks and SDN-based defences.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

2017
A Survey of Timing Channels and Countermeasures.
ACM Comput. Surv., 2017

Controlling Your Neighbour's Bandwidth for Fun and for Profit.
Proceedings of the Security Protocols XXV, 2017

2016
On the Security of Machine Learning in Malware C&C Detection: A Survey.
ACM Comput. Surv., 2016

2015
BotSpot: fast graph based identification of structured P2P bots.
J. Comput. Virol. Hacking Tech., 2015

2014
Blindspot: Indistinguishable Anonymous Communications.
CoRR, 2014

Command & Control: Understanding, Denying and Detecting.
CoRR, 2014

On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis.
Proceedings of the Security Protocols XXII, 2014

Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks.
Proceedings of the Security Protocols XXI, 2013

2011
Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011

Who clicks there!: Anonymizing the photographer in a camera saturated society
CoRR, 2011

Who clicks there!: anonymising the photographer in a camera saturated society.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

P3CA: Private Anomaly Detection Across ISP Networks.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Stegobot: A Covert Social Network Botnet.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
BotGrep: Finding P2P Bots with Structured Graph Analysis.
Proceedings of the 19th USENIX Security Symposium, 2010

The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Robust covert network topologies.
PhD thesis, 2009

2008
The Economics of Covert Community Detection and Hiding.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
Privacy Amplification with Social Networks (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Privacy Amplification with Social Networks.
Proceedings of the Security Protocols, 2007

Anonymity in the Wild: Mixes on Unstructured Networks.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

New Strategies for Revocation in Ad-Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Dynamic Topologies for Robust Scale-Free Networks.
Proceedings of the Bio-Inspired Computing and Communication, 2007

2005
The topology of covert conflict.
IACR Cryptol. ePrint Arch., 2005

Topology of Covert Conflict.
Proceedings of the Security Protocols, 2005


  Loading...