Abbas Acar
YOU?
Author Swipe
View article: Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors Open
As Virtual Reality (VR) technologies advance, their application in privacy-sensitive contexts, such as meetings, lectures, simulations, and training, expands. These environments often involve conversations that contain privacy-sensitive in…
View article: Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense Mechanism
Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense Mechanism Open
Ransomware is an increasingly prevalent form of malware targeting end-users, governments, and businesses. As it has evolved, adversaries added new capabilities to their arsenal. We propose a next-generation browser-based ransomware, RøB , …
View article: With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces Open
This article provides an overview of security and privacy challenges and concerns that come with modern browser application programming interfaces. We aim to inform the community about intrinsic risks associated with their usage and sugges…
View article: Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones Open
Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and…
View article: Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones Open
Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and…
View article: A Survey on Decentralized Identifiers and Verifiable Credentials
A Survey on Decentralized Identifiers and Verifiable Credentials Open
Digital identity has always been considered the keystone for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has gone through many technological transformations that have also affected …
View article: 50 Shades of Support: A Device-Centric Analysis of Android Security Updates
50 Shades of Support: A Device-Centric Analysis of Android Security Updates Open
Android is by far the most popular OS with over three billion active mobile devices.As in any software, uncovering vulnerabilities on Android devices and applying timely patches are both critical.Android Open Source Project has initiated e…
View article: Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices Open
In this work, we present a device-centric analysis of security and privacy\nattacks and defenses on Extended Reality (XR) devices, highlighting the need\nfor robust and privacy-aware security mechanisms. Based on our analysis, we\npresent …
View article: A comprehensive security and performance assessment of UAV authentication schemes
A comprehensive security and performance assessment of UAV authentication schemes Open
In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the civilian airspace, UAVs play an importa…
View article: A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks Open
Recently, cryptojacking malware has become an easy way of reaching and profiting from a large number of victims.Prior works studied the cryptojacking detection systems focusing on both in-browser and host-based cryptojacking malware.Howeve…
View article: The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments Open
scale, the analysis performed on data collected from multiple devices may reveal substantially more forensic details about the activities occurring in the smart environment at any time.In fact, in some countries, insurance companies have s…
View article: SoK: Cryptojacking Malware
SoK: Cryptojacking Malware Open
Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies,…
View article: Privacy-aware Security Applications in the Era of Internet of Things
Privacy-aware Security Applications in the Era of Internet of Things Open
In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware …
View article: KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home Open
In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the …
View article: An Analysis of Malware Trends in Enterprise Networks
An Analysis of Malware Trends in Enterprise Networks Open
We present an empirical and large-scale analysis of malware samples captured from two different enterprises from 2017 to early 2018. Particularly, we perform threat vector, social-engineering, vulnerability and time-series analysis on our …
View article: Curie
Curie Open
Data sharing among partners---users, companies, organizations---is crucial for the advancement of collaborative machine learning in many domains such as healthcare, finance, and security. Sharing through secure computation and other means …
View article: IoTDots: A Digital Forensics Framework for Smart Environments
IoTDots: A Digital Forensics Framework for Smart Environments Open
IoT devices and sensors have been utilized in a cooperative manner to enable the concept of a smart environment. In these smart settings, abundant data is generated as a result of the interactions between devices and users' day-to-day acti…
View article: A Survey on Homomorphic Encryption Schemes
A Survey on Homomorphic Encryption Schemes Open
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive ri…
View article: WACA: Wearable-Assisted Continuous Authentication
WACA: Wearable-Assisted Continuous Authentication Open
One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login se…
View article: Achieving Secure and Differentially Private Computations in Multiparty Settings
Achieving Secure and Differentially Private Computations in Multiparty Settings Open
Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed part…
View article: Achieving Secure and Differentially Private Computations in Multiparty\n Settings
Achieving Secure and Differentially Private Computations in Multiparty\n Settings Open
Sharing and working on sensitive data in distributed settings from healthcare\nto finance is a major challenge due to security and privacy concerns. Secure\nmultiparty computation (SMC) is a viable panacea for this, allowing distributed\np…
View article: A Survey on Homomorphic Encryption Schemes: Theory and Implementation
A Survey on Homomorphic Encryption Schemes: Theory and Implementation Open
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. Especially with popular cloud services, the control over the …
View article: Curie: Policy-based Secure Data Exchange
Curie: Policy-based Secure Data Exchange Open
Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computat…