Kevin Fu

Orcid: 0000-0002-5770-6421

Affiliations:
  • University of Michigan, Ann Arbor, MI, USA
  • University of Massachusetts Amherst, USA (former)


According to our database1, Kevin Fu authored at least 83 papers between 1997 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2022, "For contributions to computer security, and especially to the secure engineering of medical devices".

IEEE Fellow

IEEE Fellow 2018, "For contributions to embedded and medical device security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Generalization of Heterogeneous Multi-Robot Policies via Awareness and Communication of Capabilities.
Proceedings of the Conference on Robot Learning, 2023

2022
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

VeriMask: Sensor Platform for Decontamination of N95 Masks.
GetMobile Mob. Comput. Commun., 2022

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022

Side Auth: Synthesizing Virtual Sensors for Authentication.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

2021
VeriMask: Facilitating Decontamination of N95 Masks in the COVID-19 Pandemic: Challenges, Lessons Learned, and Safeguarding the Future.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification.
CoRR, 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects.
Proceedings of the 2021 IEEE Sensors, Sydney, Australia, October 31 - Nov. 3, 2021, 2021

2020
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
CoRR, 2020

Grand Challenges for Embedded Security Research in a Connected World.
CoRR, 2020

How to curtail oversensing in the home.
Commun. ACM, 2020

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Automating decontamination of N95 masks for frontline workers in COVID-19 pandemic: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control Systems.
CoRR, 2019

On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comput. Biol. Medicine, 2019

Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Risks of trusting the physics of sensors.
Commun. ACM, 2018

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Safety and Security for Intelligent Infrastructure.
CoRR, 2017

WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Persistent Clocks for Batteryless Sensing Devices.
ACM Trans. Embed. Comput. Syst., 2016

Systems Computing Challenges in the Internet of Things.
CoRR, 2016

Medical Device Security: The First 165 Years.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

2015
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

Probable cause: the deanonymizing effects of approximate DRAM.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

2014
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.
IACR Cryptol. ePrint Arch., 2014

The Swarm at the Edge of the Cloud.
IEEE Des. Test, 2014

2013
Half-Wits: Software Techniques for Low-Voltage Probabilistic Storage on Microcontrollers with NOR Flash Memory.
ACM Trans. Embed. Comput. Syst., 2013

Controlling for cybersecurity risks of medical device software.
Commun. ACM, 2013

WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

Design challenges for secure implantable medical devices.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers.
IACR Cryptol. ePrint Arch., 2011

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Ekho: bridging the gap between simulation and reality in tiny energy-harvesting sensors.
Proceedings of the 4th Workshop on Power-Aware Computing and Systems, 2011

They can hear your heartbeats: non-invasive security for implantable medical devices.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Recent Results in Computer Security for Medical Devices.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Exploiting Half-Wits: Smarter Storage for Low-Power Devices.
Proceedings of the 9th USENIX Conference on File and Storage Technologies, 2011

Mementos: system support for long-running computation on RFID-scale devices.
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011

2010
Private memoirs of a smart meter.
Proceedings of the BuildSys'10, 2010

On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors.
Proceedings of the 8th International Conference on Mobile Systems, 2010

2009
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers.
IEEE Trans. Computers, 2009

Inside risks - Reducing risks of implantable medical devices.
Commun. ACM, 2009

CCCP: Secure Remote Storage for Computational RFIDs.
Proceedings of the 18th USENIX Security Symposium, 2009

Hybrid-powered RFID sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

2008
Security and Privacy for Implantable Medical Devices.
IEEE Pervasive Comput., 2008

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling.
Proceedings of the Workshop on Power Aware Computing and Systems, 2008

2007
Cryptanalysis of Two Lightweight RFID Authentication Schemes.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Proceedings of the Financial Cryptography and Data Security, 2007

Panel: RFID Security and Privacy.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006

Secure Software Updates: Disappointments and New Challenges.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Privacy for Public Transportation.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Integrity and access control in untrusted content distribution networks.
PhD thesis, 2005

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
IACR Cryptol. ePrint Arch., 2005

2004
REX: Secure, Extensible Remote Execution.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

2003
Plutus: Scalable Secure File Sharing on Untrusted Storage.
Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31, 2003

2002
Using SFS for a Secure Network File System.
login Usenix Mag., 2002

Fast and secure distributed read-only file system.
ACM Trans. Comput. Syst., 2002

2001
Web Cookies: Not Just a Privacy Risk.
Commun. ACM, 2001

The Dos and Don'ts of Client Authentication on the Web.
Proceedings of the 10th USENIX Security Symposium, 2001

2000
In Memory of David Huffman.
ACM Crossroads, 2000

1999
Introduction: format C.
XRDS, 1999

RTLinux: an interview with Victor Yodaiken.
XRDS, 1999

1998
Networks and distributed systems: introduction.
XRDS, 1998

1997
Revocation of Unread E-mail in an Untrusted Network.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...