Amir Rahmati
TitleCited byYear
Robust physical-world attacks on deep learning visual classification
K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ...
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
581*2018
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash
1392016
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS, 2017
1282017
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
Presented as part of the 2013 {USENIX} Workshop on Health Information …, 2013
1032013
{TARDIS}: Time and Remanence Decay in {SRAM} to Implement Secure Protocols on Embedded Devices without Clocks
A Rahmati, M Salajegheh, D Holcomb, J Sorber, WP Burleson, K Fu
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
602012
Physical adversarial examples for object detectors
D Song, K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, F Tramer, ...
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
58*2018
Internet of things security research: A rehash of old ideas or new intellectual challenges?
E Fernandes, A Rahmati, K Eykholt, A Prakash
IEEE Security & Privacy 15 (4), 79-84, 2017
462017
Decentralized action integrity for trigger-action IoT platforms
E Fernandes, A Rahmati, J Jung, A Prakash
Proceedings 2018 Network and Distributed System Security Symposium, 2018
382018
Reliable physical unclonable functions using data retention voltage of SRAM cells
X Xu, A Rahmati, DE Holcomb, K Fu, W Burleson
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
362015
DRV-Fingerprinting: using data retention voltage of SRAM cells for chip identification
DE Holcomb, A Rahmati, M Salajegheh, WP Burleson, K Fu
International Workshop on Radio Frequency Identification: Security and …, 2012
352012
Security implications of permission models in smart-home application frameworks
E Fernandes, A Rahmati, J Jung, A Prakash
IEEE Security & Privacy 15 (2), 24-30, 2017
332017
Probable cause: the deanonymizing effects of approximate DRAM
A Rahmati, M Hicks, DE Holcomb, K Fu
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
292015
Persistent Clocks for Batteryless Sensing Devices
J HESTER, N TOBIAS, A RAHMATI, L SITANAYAH, D HOLCOMB, K FU, ...
252016
Refreshing thoughts on dram: Power saving vs. data integrity
A Rahmati, M Hicks, D Holcomb, K Fu
Workshop on Approximate Computing Across the System Stack (WACAS), 2014
182014
Context-specific access control: Conforming permissions with user expectations
A Rahmati, HV Madhyastha
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
172015
Note on attacking object detectors with adversarial stickers
K Eykholt, I Evtimov, E Fernandes, B Li, D Song, T Kohno, A Rahmati, ...
arXiv preprint arXiv:1712.08062, 2017
162017
Tyche: A risk-based permission model for smart homes
A Rahmati, E Fernandes, K Eykholt, A Prakash
2018 IEEE Cybersecurity Development (SecDev), 29-36, 2018
13*2018
IFTTT vs. Zapier: A comparative study of trigger-action programming frameworks
A Rahmati, E Fernandes, J Jung, A Prakash
arXiv preprint arXiv:1709.02788, 2017
102017
Decoupled-ifttt: Constraining privilege in trigger-action platforms for the internet of things
E Fernandes, A Rahmati, J Jung, A Prakash
arXiv preprint arXiv:1707.00405, 2017
102017
ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20