Amir Rahmati

Orcid: 0000-0001-7361-1898

According to our database1, Amir Rahmati authored at least 40 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs.
IEEE Access, 2023

Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning.
Proceedings of the ACM Web Conference 2023, 2023

Erebus: Access Control for Augmented Reality Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Transferring Adversarial Robustness Through Robust Representation Matching.
Proceedings of the 31st USENIX Security Symposium, 2022

Ares: A System-Oriented Wargame Framework for Adversarial ML.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Accelerating Certified Robustness Training via Knowledge Transfer.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Good Bot, Bad Bot: Characterizing Automated Browsing Activity.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Valve: Securing Function Workflows on Serverless Computing Platforms.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
Can Attention Masks Improve Adversarial Robustness?
CoRR, 2019

Decentralized Cooperative Communication-less Multi-Agent Task Assignment with Monte-Carlo Tree Search.
CoRR, 2019

New Problems and Solutions in IoT Security and Privacy.
CoRR, 2019

Transferable Adversarial Robustness using Adversarially Trained Autoencoders.
CoRR, 2019

VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures.
CoRR, 2019

Protecting Visual Information in Augmented Reality from Malicious Application Developers.
Proceedings of the 5th ACM Workshop on Wearable Systems and Applications, 2019

2018
Tyche: Risk-Based Permissions for Smart Home Platforms.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

Tyche: A Risk-Based Permission Model for Smart Homes.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Decentralized Action Integrity for Trigger-Action IoT Platforms.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect.
PhD thesis, 2017

Security Implications of Permission Models in Smart-Home Application Frameworks.
IEEE Secur. Priv., 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Secur. Priv., 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks.
CoRR, 2017

Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Persistent Clocks for Batteryless Sensing Devices.
ACM Trans. Embed. Comput. Syst., 2016

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

Towards Comprehensive Repositories of Opinions.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

2015
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Probable cause: the deanonymizing effects of approximate DRAM.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

Context-Specific Access Control: Conforming Permissions With User Expectations.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2013
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

2012
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012


  Loading...