Publications

(2024). MobileConfig: Remote Configuration Management for Mobile Apps at Hyperscale. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).

Cite

(2023). XFaaS: Hyperscale and Low Cost Serverless Functions at Meta. 29th Symposium on Operating Systems Principles (SOSP 23).

PDF Cite Slides

(2023). ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23).

PDF Cite Slides

(2023). Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. USENIX Symposium on Usable Privacy and Security (SOUPS).

PDF Cite Slides Video Presentation (YouTube)

(2023). Conveyor: One-Tool-Fits-All Continuous Software Deployment at Meta. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23).

PDF Cite Video Presentation ( YouTube )

(2022). Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems. Proceedings of the 2022 European Symposium on Usable Security.

PDF Cite

(2022). Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. 2022 IEEE Security and Privacy Workshops (SPW).

PDF Cite

(2022). Data Augmentation for Dementia Detection in Spoken Language. Interspeech 2022, 23rd Annual Conference of the International Speech Communication Association, Incheon, Korea, 18-22 September 2022.

PDF Cite DOI

(2021). Temporal consistency checks to detect LiDAR spoofing attacks on autonomous vehicle perception. Proceedings of the 1st Workshop on Security and Privacy for Mobile AI.

PDF Cite

(2021). Shadow-catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing. Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I 26.

PDF Cite Slides Project Website

(2021). Quantifying and Localizing Usable Information Leakage from Neural Network Gradients. arXiv preprint arXiv:2105.13929.

Cite

(2021). Open, Sesame! Introducing Access Control to Voice Services. Proceedings of the 1st Workshop on Security and Privacy for Mobile AI.

PDF Cite

(2021). Object Removal Attacks on LiDAR-based 3D Object Detectors. Workshop on Automotive and Autonomous Vehicle Security (AutoSec).

PDF Cite

(2021). Layer-wise characterization of latent information leakage in federated learning. Distributed and Private Machine Learning (DPML) workshop..

PDF Cite

(2021). Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. Annual Computer Security Applications Conference.

PDF Cite

(2020). External resource control of mobile devices. Google Patents.

PDF Cite

(2020). Darknetz: towards model privacy at the edge using trusted execution environments. 18th International Conference on Mobile Systems, Applications, and Services (MobiSys 20).

PDF Cite

(2019). Determining car positions. Google Patents.

PDF Cite

(2019). Identifying JavaScript skimmers on high-value websites. Imperial College of Science, Technology and Medicine, Imperial College London.

Cite

(2019). BEEER: distributed record and replay for medical devices in hospital operating rooms. Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security.

PDF Cite

(2018). Toward an Extensible Framework for Redaction. 1st International Workshop on Security and Privacy for the Internet-of-Things.

PDF Cite

(2018). Resolving the predicament of android custom permissions. 25th Network and Distributed System Security Symposium (NDSS 18).

PDF Cite Slides Video Presentation Source Code (Formal Model) Project Website

(2018). Codrive: Improving automobile positioning via collaborative driving. IEEE International Conference on Computer Communications (INFOCOM 18).

PDF Cite Slides Watch on YouTube

(2017). Understanding IoT security through the data crystal ball: Where we are now and where we are going to be. arXiv preprint arXiv:1703.09809.

PDF Cite

(2017). HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks.

PDF Cite Slides Project Website

(2017). Ghost installer in the shadow: Security analysis of app installation on android. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

PDF Cite

(2017). CamForensics: Understanding visual privacy leaks in the wild. Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems.

PDF Cite

(2016). Free for all! assessing user data exposure to advertising libraries on android.. 23rd Network and Distributed System Security Symposium (NDSS 16).

PDF Cite

(2016). Draco: A system for uniform and fine-grained access control for web code on android. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.

PDF Cite

(2015). What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.. 22nd Network and Distributed System Security Symposium (NDSS 15).

PDF Cite

(2014). Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. The Network and Distributed System Security Symposium (NDSS).

PDF Cite

(2013). Identity, location, disease and more: Inferring your secrets from android public resources. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS 13).

PDF Cite

(2013). Discovering the invisible city: Location-based games for learning in smart cities.. IxD&A.

PDF Cite

(2011). Content creation by end users for location-sensitive mobile educational games. Proceedings, IS-EUD 2011 Workshop Involving End Users and Domain Experts in Design of Educational Games.

Cite