Earlence Fernandes

Orcid: 0000-0001-8593-2840

According to our database1, Earlence Fernandes authored at least 54 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Misusing Tools in Large Language Models With Visual Adversarial Examples.
CoRR, 2023

CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance.
CoRR, 2022

Analyzing the Security of the Business Collaboration Platform App Model.
CoRR, 2022

Practical Data Access Minimization in Trigger-Action Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

Experimental Security Analysis of the App Model in Business Collaboration Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

SoK: Authentication in Augmented and Virtual Reality.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Exploring Adversarial Robustness of Deep Metric Learning.
CoRR, 2021

Data Privacy in Trigger-Action Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SoK: Context Sensing for Access Control in the Adversarial Home IoT.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Data Privacy in Trigger-Action IoT Systems.
CoRR, 2020

Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification.
CoRR, 2020

2019
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019

New Problems and Solutions in IoT Security and Privacy.
CoRR, 2019

Analyzing the Interpretability Robustness of Self-Explaining Models.
CoRR, 2019

Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
Tyche: Risk-Based Permissions for Smart Home Platforms.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
Proceedings of the 27th USENIX Security Symposium, 2018

Tyche: A Risk-Based Permission Model for Smart Homes.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Decentralized Action Integrity for Trigger-Action IoT Platforms.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Securing Personal IoT Platforms through Systematic Analysis and Design.
PhD thesis, 2017

Security Implications of Permission Models in Smart-Home Application Frameworks.
IEEE Secur. Priv., 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Secur. Priv., 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks.
CoRR, 2017

Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Computer Security and Privacy for the Physical World.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

Security Analysis of Emerging Smart Home Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

Appstract: on-the-fly app content semantics with better privacy.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Practical Always-on Taint Tracking on Mobile Devices.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

My OS Ought to Know Me Better: In-app Behavioural Analytics as an OS Service.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Decomposable Trust for Android Applications.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

Anception: Application Virtualization For Android.
CoRR, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Inf. Forensics Secur., 2013

The Confinement Problem: 40 Years Later.
J. Inf. Process. Syst., 2013

2012
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Inf. Forensics Secur., 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
YAASE: Yet Another Android Security Extension.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011


  Loading...