Mobile Devices and IoT Systems Security
Mar 6, 2021
GOAL: Study of adversarial capabilities and development of novel defense strategies for smartphone and IoT systems.
With smartphone penetration soaring and the rapid advancements in Internet connected devices, mobile and IoT device security guarantees are needed more than ever. Adversaries can leverage the fact that mobile devices are equipped with a multitude of sensing and their always present nature to launch sophisticated inference attacks to violate users’ confidentiality and the platforms’ integrity. This research thrust aims to study such adversarial capabilities in smartphone and IoT systems in consumer and enterprise settings.

Soteris Demetriou
Assistant Professor of Systems Security
I’m interested in the security and privacy of mobile devices and systems at the edge of the network.
Publications
S. Khan,
D. Woszczyk,
C. You,
S. Demetriou,
M. Naveed
LiDAR-driven 3D sensing allows new generations of vehicles to achieve advanced levels of situation awareness. However, recent works …
Zhongyuan Hau,
Soteris Demetriou,
Luis Muñoz-González,
Emil C. Lupu
We present DarkneTZ, a framework that uses an edge device’s Trusted Execution Environment (TEE) in conjunction with model …
Fan Mo,
Ali Shahin Shamsabadi,
Kleomenis Katevas,
Soteris Demetriou,
Ilias Leontiadis,
Andrea Cavallaro,
Hamed Haddadi
Medical devices in hospital operating rooms are getting increasingly interconnected. This enables them to download instructions and …
Avesta Hojjati,
Yunhui Long,
Soteris Demetriou,
Carl A. Gunter
Data is being created at an increasing rate by sources like the IoT devices, social media, and camera monitors. This data frequently …
Soteris Demetriou,
Nathaniel D Kaufman,
Jonah Baim,
Adam J Goldsher,
Carl A Gunter
Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any …
Y. Lee,
T. Li,
N. Zhang,
S. Demetriou,
M. Zha,
X. Wang,
K. Chen,
X. Zhou,
X. Han,
M. Grace
Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into …
Nan Zhang,
Soteris Demetriou,
Xianghang Mi,
Wenrui Diao,
Kan Yuan,
Peiyuan Zong,
Feng Qian,
XiaoFeng Wang,
Kai Chen,
Yuan Tian,
Carl A. Gunter,
Kehuan Zhang,
Patrick Tague,
Yue-Hsun Lin
Many studies focused on detecting and measuring the security and privacy risks associated with the integration of advertising libraries …
Soteris Demetriou,
Whitney Merrill,
Wei Yang,
Aston Zhang,
Carl A. Gunter
Today’s smartphones can be armed with many types of external devices, such as medical devices and credit card readers, that enrich …
Muhammad Naveed,
Xiaoyong Zhou,
Soteris Demetriou,
XiaoFeng Wang,
Carl A Gunter
The design of Android is based on a set of unprotected shared resources, including those inherited from Linux (e.g., Linux public …
Xiaoyong Zhou,
Soteris Demetriou,
Dongjing He,
Muhammad Naveed,
Xiaorui Pan,
XiaoFeng Wang,
Carl A. Gunter,
Klara Nahrstedt