Spring 2020 Seminars:




Feb 12 Kai Wang Void: A fast and light voice liveness detection system USENIX 2020
Ruochen Zhou CANvas:Fast and Inexpensive Automotive Network Mapping USENIX 2019
Bingjing Yan Robust Website Fingerprinting Through the Cache Occupancy Channel USENIX 2019
Feb 14 Jiahui Yang Peeves:Physical Event Verification in Smart Homes CCS 2019
Chen Yan Robust Performance Metrics for Authentication Systems NDSS 2019
Jiangyi Deng Leaky Images: Targeted Privacy Attacks in the Web Usenix 2019
Feb 20 Qinhong Jiang WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing S&P 2020
Tao Zhao DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids’ Cyber-Physical Infrastructures NDSS 2020
Juchuan Zhang Wireless Attacks on Aircraft Instrument Landing Systems USENIX 2019
Feb 21 Yanjie Li TEXTBUGGER: Generating Adversarial Text Against Real-world Applications NDSS 2019
Yushi Cheng RNN-based Room Scale Hand Motion Tracking MobiCom 2019
Ruiwen He Defeating Hidden Audio Channel Attacks on Voice Assistants via Audio-induced Surface Vibrations ACSAC 2019
Feb 27 Xinfeng Li Perceptual Based Adversarial Audio Attacks arxiv
Chaohao Li Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices USENIX 2020
Jiayu Zhang Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication
Feb 28 Zhiyun Wang CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel USENIX 2019
Kaibo Wang Weight Agnostic Neural Networks NIPS 2019
Fei Teng Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies S&P 2020
Mar 5 Yijie Bai Knockoff Nets: Stealing Functionality of Black-Box Models CVPR 2019
Yan Jiang Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps S&P 2019
Mar 6 Zizhi Jin Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems arxiv
Yuehan Chi Security of GPS/INS based On-road Location Tracking Systems S&P 2019
Yuepeng Zhang Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer NDSS 2020
Mar 12 Jiahui Yang Et Tu Alexa?When Commodity WiFi Devices Turn into Adversarial Motion Sensors NDSS 2020
Zhuoyang Shi Robust audio adversarial example for a physical attack IJCAI 2019
Mar 13 Kai Wang SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves NDSS2020
Ruochen Zhou Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft NDSS 2020
Binjing Yan On the Challenges of Geographical Avoidance for Tor NDSS 2019
Mar 19 Yanmiao Zhang An Observational Investigation of Reverse Engineers Processes Chi-ea 2019
Chen Yan Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems NDSS 2020
Jiangyi Deng Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors CCS 2019
Mar 20 Qinhong Jiang OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display NDSS 2020
Tao Zhao FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic NDSS 2020
Juchuan Zhang Leveraging EM Side-Channel Information to Detect Rowhammer Attacks S&P 2020
Mar 26 Yanjie Li A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems NDSS 2019
Yushi Cheng PINGPONG: Packet-Level Signatures for Smart Home Device Events NDSS 2020
Ruiwen He Humpty Dumpty: Controlling Word Meanings via Corpus Modifications S&P 2020
Mar 27 Xinfeng Li The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection NDSS 2019
Chaohao Li Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses S&P 2020
Jiayu Zhang Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers USENIX 2019
April 2 Zhiyun Wang SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants USENIX 2020
Kaibo Wang Learning Transferable Adversarial Examples via Ghost Networks AAAI 2020
Fei Teng Developing Measures of Cognitive Impairment in the Real World from Consumer-Grade Multimodal Sensor Streams KDD 2019
April 3 Yijie Bai ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models NDSS 2019
Yan Jiang ShadowMove: A Stealthy Lateral Movement Strategy USENEX 2020
Tianchen Zhang Stealthy Tracking of Autonomous Vehicles with Cache Side Channels USENIX 2020
April 9 Zizhi Jin SeVI: Boosting Secure Voice Interactionswith Smart Devices Infocom 2020
Yuehan Chi VoltJockey : Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies CCS 2019
Yuepeng Zhang Continuous User Verification via Respiratory Biometrics Infocom 2020
April 10 Kai Wang On the Resilience of Biometric Authentication Systems against Random Inputs arxiv
Ruochen Zhou Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft NDSS 2020
Binjing Yan Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting NDSS 2020
April 16 Jiahui Yang Encrypted DNS --> Privacy? A Traffic Analysis Perspective NDSS 2020
Chen Yan Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars CHES 2019
Jiangyi Deng Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks NDSS 2020
April 17 Qinhong Jiang mmTrack: Passive Multi-Person Localization Using Commodity Millimeter Wave Radio Infocom 2020
Tao Zhao Challenges and Opportunities in CPS Security: A Physics-based Perspective arxiv 2020
Juchuan Zhang C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage S&P 2020
April 23 Yanjie Li Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines NDSS 2019
Yushi Cheng Zero-delay Lightweight Defenses against Website Fingerprinting sec20fall
Ruiwen He Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home Infocom 2020
April 24 Xinfeng Li Attentive Statistics Pooling for Deep Speaker Embedding Interspeech 2019
Chaohao Li IoTGAZE: IoT Security Enforcement via Wireless Context Analysis Infocom 2020
Tao Zhao Challenges and Opportunities in CPS Security: A Physics-based Perspective arxiv 2020
April 30 Zhiyun Wang RAMBleed: Reading Bits in Memory Without Accessing Them S&P 2020
Kaibo Wang
Fei Teng Differentiating Higher and Lower Job Performers in the Workplace Using Mobile Sensing Ubicomp 2019