Z. Berkay Celik

Orcid: 0000-0001-7362-8905

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, Z. Berkay Celik authored at least 70 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physical Side-Channel Attacks against Intermittent Devices.
Proc. Priv. Enhancing Technol., 2024

Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks.
CoRR, 2024

Rethinking How to Evaluate Language Model Jailbreak.
CoRR, 2024

Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics.
CoRR, 2024

VOGUES: Validation of Object Guise using Estimated Components.
Proceedings of the 33rd USENIX Security Symposium, 2024

Understanding the Security and Privacy Implications of Online Toxic Content on Refugees.
Proceedings of the 33rd USENIX Security Symposium, 2024

SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants.
Proceedings of the 33rd USENIX Security Symposium, 2024

ATTention Please! An Investigation of the App Tracking Transparency Permission.
Proceedings of the 33rd USENIX Security Symposium, 2024

Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

A Systematic Study of Physical Sensor Attack Hardness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Expectation Conformance in Online Sound Therapy: Designing Tools for Users of Mental Wellbeing Applications.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

ERACAN: Defending Against an Emerging CAN Threat Model.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches.
Proc. Priv. Enhancing Technol., April, 2023

Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

ZBCAN: A Zero-Byte CAN Defense System.
Proceedings of the 32nd USENIX Security Symposium, 2023

That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023

PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality.
Proceedings of the 32nd USENIX Security Symposium, 2023

One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evasion Attacks and Defenses on Smart Home Physical Event Verification.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022

IoTRepair: Flexible Fault Handling in Diverse IoT Deployments.
ACM Trans. Internet Things, 2022

SARA: Secure Android Remote Authorization.
Proceedings of the 31st USENIX Security Symposium, 2022

Behind the Tube: Exploitative Monetization of Content on YouTube.
Proceedings of the 31st USENIX Security Symposium, 2022

PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Robust and Energy Efficient Malware Detection for Robotic Cyber-Physical Systems.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Discovering IoT Physical Channel Vulnerabilities.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Physical Hijacking Attacks against Object Trackers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Real-time Analysis of Privacy-(un)aware IoT Applications.
Proc. Priv. Enhancing Technol., 2021

S3: Side-Channel Attack on Stylus Pencil through Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning.
CoRR, 2021

Unifying Distillation with Personalization in Federated Learning.
CoRR, 2021

Discovering Physical Interaction Vulnerabilities in IoT Deployments.
CoRR, 2021

A survey on IoT platforms: Communication, security, and privacy perspectives.
Comput. Networks, 2021

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.
Proceedings of the 30th USENIX Security Symposium, 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Proceedings of the 30th USENIX Security Symposium, 2021

On the Safety Implications of Misordered Events and Commands in IoT Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Towards Improving Container Security by Preventing Runtime Escapes.
Proceedings of the IEEE Secure Development Conference, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Evading Voltage-Based Intrusion Detection on Automotive CAN.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

2020
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020

Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

IoTRepair: Systematically Addressing Device Faults in Commodity IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Extending Detection with Privileged Information via Generalized Distillation.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

Detection under Privileged Information.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Patient-Driven Privacy Control through Generalized Distillation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Feature Cultivation in Privileged Information-augmented Detection.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Machine Learning in Adversarial Settings.
IEEE Secur. Priv., 2016

Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016

Building Better Detection with Privileged Information.
CoRR, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Malware traffic detection using tamper resistant features.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2013
Detection of Fast-Flux Networks using various DNS feature sets.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2011
Salting Public Traces with Attack Traffic to Test Flow Classifiers.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011


  Loading...