Carl A. Gunter

Orcid: 0009-0006-6943-0684

Affiliations:
  • University of Illinois, Urbana-Champaign, IL, USA
  • University of Pennsylvania, Philadelphia, PA, USA


According to our database1, Carl A. Gunter authored at least 179 papers between 1985 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

How to Cover up Anomalous Accesses to Electronic Health Records.
Proceedings of the 32nd USENIX Security Symposium, 2023

Evaluating User Behavior in Smartphone Security: A Psychometric Perspective.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

A Tagging Solution to Discover IoT Devices in Apartments.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
EDoG: Adversarial Edge Detection For Graph Neural Networks.
CoRR, 2022

Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing.
CoRR, 2022

2021
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection.
CoRR, 2021

Detecting AI Trojans Using Meta Neural Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

DOVE: A Data-Oblivious Virtual Environment.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
WSEmail.
Serv. Oriented Comput. Appl., 2020

Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security.
CoRR, 2020

Grand Challenges for Embedded Security Research in a Connected World.
CoRR, 2020

See No Evil: Phishing for Permissions with False Transparency.
Proceedings of the 29th USENIX Security Symposium, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

A Hypothesis Testing Approach to Sharing Logs with Confidence.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services.
CoRR, 2019

Scalable Differentially Private Generative Student Model via PATE.
CoRR, 2019

BEEER: distributed record and replay for medical devices in hospital operating rooms.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Charting the Attack Surface of Trigger-Action IoT Platforms.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud.
IEEE J. Sel. Top. Signal Process., 2018

Distributed and Secure ML with Self-tallying Multi-party Aggregation.
CoRR, 2018

Understanding Membership Inferences on Well-Generalized Learning Models.
CoRR, 2018

NRF: A Naive Re-identification Framework.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

Fear and Logging in the Internet of Things.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Resolving the Predicament of Android Custom Permissions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Plausible Deniability for Privacy-Preserving Data Synthesis.
Proc. VLDB Endow., 2017

Towards Measuring Membership Privacy.
CoRR, 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Privacy and Security in Mobile Health: A Research Agenda.
Computer, 2016

Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach.
Proceedings of the 25th International Conference on World Wide Web, 2016

Free for All! Assessing User Data Exposure to Advertising Libraries on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Building bridges across electronic health record systems through inferred phenotypic topics.
J. Biomed. Informatics, 2015

Toward a science of learning systems: a research agenda for the high-functioning Learning Health System.
J. Am. Medical Informatics Assoc., 2015

Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

Discovering de facto diagnosis specialties.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization.
Proceedings of the AMIA 2015, 2015

2014
Dynamic Searchable Encryption via Blind Storage.
IACR Cryptol. ePrint Arch., 2014

Privacy and Security in the Genomic Era.
CoRR, 2014

Detecting Roles and Anomalies in Hospital Access Audit Logs.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Privacy Risk in Anonymized Heterogeneous Information Networks.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Joint inference for end-to-end coreference resolution for clinical notes.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

Detecting privacy-sensitive events in medical text.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

Security Concerns in Android mHealth Apps.
Proceedings of the AMIA 2014, 2014

2013
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits.
ACM Trans. Manag. Inf. Syst., 2013

Securing Information Technology in Healthcare.
IEEE Secur. Priv., 2013

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Evolving role definitions through permission invocation patterns.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Modeling and detecting anomalous topic access.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Identity, location, disease and more: inferring your secrets from android public resources.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Cumulative Attestation Kernels for Embedded Systems.
IEEE Trans. Smart Grid, 2012

Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks.
IEEE/ACM Trans. Netw., 2012

Tragedy of Anticommons in Digital Right Management of Medical Records.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

2011
Nonintrusive Load-Shed Verification.
IEEE Pervasive Comput., 2011

Application-aware secure multicast for power grid communications.
Int. J. Secur. Networks, 2011

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.
IEEE Secur. Priv., 2011

Role Prediction Using Electronic Medical Record System Audits.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Enforcing Executing-Implies-Verified with the Integrity-Aware Processor.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Making DTNs robust against spoofing attacks with localized countermeasures.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.
Proceedings of the Network and Distributed System Security Symposium, 2011

Reconstructing Hash Reversal based Proof of Work Schemes.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

MyABDAC: compiling XACML policies for attribute-based database access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Reliable telemetry in white spaces using remote attestation.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Attribute-Based Messaging: Access Control and Confidentiality.
ACM Trans. Inf. Syst. Secur., 2010

EBAM: Experience-Based Access Management for Healthcare.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Tiered Incentives for Integrity Based Queuing.
Proceedings of the 2010 Workshop on the Economics of Networks, Systems, and Computation, 2010

Diagnostic powertracing for sensor node failure analysis.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2009
Guest editorial network infrastructure configuration.
IEEE J. Sel. Areas Commun., 2009

Sh@re: Negotiated Audit in Social Networks.
Proceedings of the IEEE International Conference on Systems, 2009

How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

Completeness of discovery protocols.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Safety in discretionary access control for logic-based publish-subscribe systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Strong and Weak Policy Relations.
Proceedings of the POLICY 2009, 2009

Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers.
Proceedings of the POLICY 2009, 2009

Collaborative Recommender Systems for Building Automation.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Specifying and Analyzing Workflows for Automated Identification and Data Capture.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Model-Checking DoS Amplification for VoIP Session Initiation.
Proceedings of the Computer Security, 2009

Implementing Reflective Access Control in SQL.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

Adaptive SelectiveVerification.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

An Integrated Architecture for Demand Response Communications and Control.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2008

A formal framework for reflective database access control policies.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Using rhythmic nonces for puzzle-based DoS resistance.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

2007
Fair Coalitions for Power-Aware Routing in Wireless Networks.
IEEE Trans. Mob. Comput., 2007

On the Safety and Efficiency of Firewall Policy Deployment.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Supporting Emergency-Response by Retasking Network Infrastructures.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

Unified Architecture for Large-Scale Attested Metering.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Reasoning about Concurrency for Security Tunnels.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Improving multi-tier security using redundant authentication.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Privacy Sensitive Location Information Systems in Smart Buildings.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

I-Living: An Open System Architecture for Assisted Living.
Proceedings of the IEEE International Conference on Systems, 2006

AMPol-Q: Adaptive Middleware Policy to Support QoS.
Proceedings of the Service-Oriented Computing, 2006

AMPol: Adaptive Messaging Policy.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Reducing Risk by Managing Software Related Failures in Networked Control Systems.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006

Securing the drop-box architecture for assisted living.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

Defeasible security policy composition for web services.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

Using Attribute-Based Access Control to Enable Attribute-Based Messaging.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Network Event Recognition.
Formal Methods Syst. Des., 2005

Formal prototyping in early stages of protocol design.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

WSEmail: Secure Internet Messaging Based on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2004
A Formal Privacy System and Its Application to Location Based Services.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

DoS Protection for Reliably Authenticated Broadcast.
Proceedings of the Network and Distributed System Security Symposium, 2004

A model-based approach to integrating security policies for embedded devices.
Proceedings of the EMSOFT 2004, 2004

The Consistency of Task-Based Authorization Constraints in Workflow Systems.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Reasoning About Secrecy for Active Networks.
J. Comput. Secur., 2003

Open APIs for Embedded Security.
Proceedings of the ECOOP 2003, 2003

2002
Verisim: Formal Analysis of Network Simulations.
IEEE Trans. Software Eng., 2002

Formal verification of standards for distance vector routing protocols.
J. ACM, 2002

Requirements for a Practical Network Event Recognition Language.
Proceedings of the Runtime Verification 2002, 2002

Micro Mobile Programs.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Predictable programs in barcodes.
Proceedings of the International Conference on Compilers, 2002

2001
What packets may come: automata for network monitoring.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

Models and Languages for Digital Rights.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
Abstracting dependencies between software configuration items.
ACM Trans. Softw. Eng. Methodol., 2000

Policy-directed certificate retrieval.
Softw. Pract. Exp., 2000

A Reference Model for Requirements and Specifications.
IEEE Softw., 2000

Formal software engineering.
ACM SIGSOFT Softw. Eng. Notes, 2000

Automated analysis of standard ML.
ACM SIGSOFT Softw. Eng. Notes, 2000

Routing Information Protocol in HOL/SPIN.
Proceedings of the Theorem Proving in Higher Order Logics, 13th International Conference, 2000

Generalized Certificate Revocation.
Proceedings of the POPL 2000, 2000

Certificate Distribution with Local Autonomy.
Proceedings of the Active Networks, Second International Working Conference, 2000

A Reference Model for Requirements and Specifications-Extended Abstract.
Proceedings of the 4th International Conference on Requirements Engineering, 2000

Specification and Formal Analysis of a PLAN Algorithm in Maude.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Fault origin adjudication.
Proceedings of the Third Workshop on Formal Methods in Software Practice, 2000

1999
Specifying the PLAN Network Programming Langauge.
Proceedings of the Third Workshop on Higher-Order Operational Techniques in Semantics, 1999

PLANet: An Active Internetwork.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
The SwitchWare active network architecture.
IEEE Netw., 1998

The Village Telephone System: A Case Study in Formal Software Engineering.
Proceedings of the Theorem Proving in Higher Order Logics, 11th International Conference, 1998

PLAN: A Packet Language for Active Networks.
Proceedings of the third ACM SIGPLAN International Conference on Functional Programming (ICFP '98), 1998

Network Programming Using PLAN.
Proceedings of the Internet Programming Languages, 1998

1997
The Common Order-Theoretic Structure of Version Spaces and ATMSs.
Artif. Intell., 1997

1996
Reference Counting as a Computational Interpretation of Linear Logic.
J. Funct. Program., 1996

Strategic Directions in Software Engineering and Programming Languages.
ACM Comput. Surv., 1996

Sets as Anti-Chains.
Proceedings of the Concurrency and Parallelism, 1996

1995
A Generalization of Exceptions and Control in ML-like Languages.
Proceedings of the seventh international conference on Functional programming languages and computer architecture, 1995

1993
Computing ML Equality Kinds Using Abstract Interpretation
Inf. Comput., December, 1993

Forms of Semantic Specification.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

Semantics of programming languages - structures and techniques.
Foundations of computing, MIT Press, ISBN: 978-0-262-07143-7, 1993

1992
The Mixed Powerdomain.
Theor. Comput. Sci., 1992

Proving Memory Management Invariants for a Language Based on Linear Logic.
Proceedings of the Conference on Lisp and Functional Programming, 1992

Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker.
Proceedings of the Automated Deduction, 1992

1991
Inheritance as Implicit Coercion
Inf. Comput., July, 1991

Forms of Semantic Specification.
Bull. EATCS, 1991

An Abstract Interpretation for ML Equality Kinds.
Proceedings of the Theoretical Aspects of Computer Software, 1991

The Common Order-Theoretic Structure of Version Spaces and ATMS's.
Proceedings of the 9th National Conference on Artificial Intelligence, 1991

1990
Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs.
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990

Normal Process Representatives
Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS '90), 1990

Computing with Coercions.
Proceedings of the 1990 ACM Conference on LISP and Functional Programming, 1990

Semantic Domains.
Proceedings of the Handbook of Theoretical Computer Science, 1990

1989
Domain Theoretic Models of Polymorphism
Inf. Comput., May, 1989

Inheritance and Explicit Coercion (Preliminary Report)
Proceedings of the Fourth Annual Symposium on Logic in Computer Science (LICS '89), 1989

1988
Coherence and Consistency in Domains (Extended Outline)
Proceedings of the Third Annual Symposium on Logic in Computer Science (LICS '88), 1988

1987
Universal Profinite Domains
Inf. Comput., January, 1987

DI-Domains as a Model of Polymorphism.
Proceedings of the Mathematical Foundations of Programming Language Semantics, 1987

1986
The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986

1985
Comparing Categories of Domains.
Proceedings of the Mathematical Foundations of Programming Semantics, 1985

A Universal Domain Technique for Profinite Posets.
Proceedings of the Automata, 1985


  Loading...