var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=beerkay.github.io%2Fpapers%2FmyPublications.bib&jsonp=1&fullnames=1&theme=side&hidemenu=true&commas=true&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=beerkay.github.io%2Fpapers%2FmyPublications.bib&jsonp=1&fullnames=1&theme=side&hidemenu=true&commas=true\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=beerkay.github.io%2Fpapers%2FmyPublications.bib&jsonp=1&fullnames=1&theme=side&hidemenu=true&commas=true\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Systematic Study of Physical Sensor Attack Hardness.\n \n \n \n \n\n\n \n Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, & Dongyan Xu.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (IEEE S&P), pages 1-18, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024SensorSpoofingOakland,\n  title={{A Systematic Study of Physical Sensor Attack Hardness}},\n  author = {Hyungsub Kim and Rwitam Bandyopadhyay and Muslum Ozgur Ozmen and Z. Berkay Celik and Antonio Bianchi and Yongdae Kim and Dongyan Xu},\n  booktitle={IEEE Symposium on Security and Privacy (IEEE S\\&P)},\n  year={2024},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2024SensorSpoofingOakland.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.\n \n \n \n \n\n\n \n Doguhan Yeke, Muhammad Ibrahim, Guliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, & Z. Berkay Celik.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (IEEE S&P), pages 1-18, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Wear'sPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024WearOSOakland,\n  title={{Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables}},\n  author = {Doguhan Yeke and Muhammad Ibrahim and Guliz Seray Tuncay and Habiba Farrukh and Abdullah Imran and Antonio Bianchi and Z. Berkay Celik},\n  booktitle={IEEE Symposium on Security and Privacy (IEEE S\\&P)},\n  year={2024},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2024WearOSOakland.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ATTention Please! An Investigation of the App Tracking Transparency Permission.\n \n \n \n \n\n\n \n Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, & Z. Berkay Celik.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"ATTentionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024ATTUSENIXSecurity,\n  author    = {Reham Mohamed and Arjun Arunasalam and Habiba Farrukh and Jason Tong and Antonio Bianchi and Z. Berkay Celik},\n  booktitle = {USENIX Security Symposium},\n  title     = {{ATTention Please! An Investigation of the App Tracking Transparency Permission}},\n  year      = {2024},\n  pages = {1-18},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2024ATTUSENIXSecurity.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding the Security and Privacy Implications of Online Toxic Content on Refugees.\n \n \n \n \n\n\n \n Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, & Z. Berkay Celik.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024ToxicContentUSENIXSecurity,\n  author    = {Arjun Arunasalam and Habiba Farrukh and Eliz Tekcan and Z. Berkay Celik},\n  booktitle = {USENIX Security Symposium},\n  title     = {{Understanding the Security and Privacy Implications of Online Toxic Content on Refugees}},\n  year      = {2024},\n  pages = {1-18},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2024ToxicContentUSENIXSecurity.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Poster: PLUG&CHECK: Finding Bugs in ISO15118 Implementations with EVFUZZ.\n \n \n \n \n\n\n \n Ashwin Nambiar, Z. Berkay Celik Ryan Gerdes, & Antonio Bianchi.\n\n\n \n\n\n\n In Vehicle Security and Privacy (VehicleSec), collocated with NDSS, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Poster:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024EVFUZZDemoVehicleSec,\n  author = {Ashwin Nambiar and Z. Berkay Celik Ryan Gerdes and Antonio Bianchi},\n  title     = {{{Poster}: PLUG\\&CHECK: Finding Bugs in ISO15118 Implementations with EVFUZZ}},\n  booktitle = {Vehicle Security and Privacy (VehicleSec), collocated with NDSS},\n  year={2024},\n  url = {https://beerkay.github.io/papers/Berkay2023AttrrackZoneDemoVehicleSec.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Online Toxic Content Targeting Refugees: An Investigation into Types of Toxicity Refugees Face.\n \n \n \n \n\n\n \n Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, & Z. Berkay Celik.\n\n\n \n\n\n\n In Symposium on Usable Security (USEC), collocated with NDSS, pages 1-7, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"OnlinePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024ToxicContentUSEC,\n  author    = {Arjun Arunasalam and Habiba Farrukh and Eliz Tekcan and Z. Berkay Celik},\n  title     = {Online Toxic Content Targeting Refugees: An Investigation into Types of Toxicity Refugees Face},\n  booktitle = {Symposium on Usable Security (USEC), collocated with NDSS},\n  pages = {1-7},\n  year={2024},\n  url = {https://beerkay.github.io/papers/}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Dark Side of E-commerce: Dropshipping Abuse as a Business Model.\n \n \n \n \n\n\n \n Arjun Arunasalam, Andrew Chu, M. Ozgur Ozmen, Habiba Farrukh, & Z. Berkay Celik.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), pages 1-18, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2024DropshippingNDDS,\n  author    = {Arjun Arunasalam and Andrew Chu and M. Ozgur Ozmen and Habiba Farrukh and Z. Berkay Celik},\n  booktitle = {Network and Distributed System Security Symposium (NDSS)},\n  title     = {{The Dark Side of E-commerce: Dropshipping Abuse as a Business Model}},\n  pages = {1-18},\n  year  = {2024},\n  url = {https://beerkay.github.io/papers/Berkay2024DropshippingNDDS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.\n \n \n \n \n\n\n \n Yufan Chen, Arjun Arunasalam, & Z. Berkay Celik.\n\n\n \n\n\n\n In Annual Computer Security Applications Conference (ACSAC), pages 1-15, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"CanPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023LLMMisconceptions,\n  author    = {Yufan Chen and Arjun Arunasalam and Z. Berkay Celik},\n  booktitle = {Annual Computer Security Applications Conference (ACSAC)},\n  title     = {{Can Large Language Models Provide Security \\& Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions}},\n  year      = {2023},\n  pages = {1-15},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2023LLMMisconceptions.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.\n \n \n \n \n\n\n \n Ruoyu Song, M. Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, & Antonio Bianchi.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"DiscoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023AceroUSENIXSecurity,\n  author    = {Ruoyu Song and M. Ozgur Ozmen and Hyungsub Kim and Raymond Muller and Z. Berkay Celik and Antonio Bianchi},\n  booktitle = {USENIX Security Symposium},\n  title     = {{Discovering Adversarial Driving Maneuvers against Autonomous Vehicles}},\n  year      = {2023},\n  pages = {1-18},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2023AceroUSENIXSecurity.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality.\n \n \n \n \n\n\n \n Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, & Z. Berkay Celik.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"LocIn:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023LocINUSENIXSecurity,\n  author    = {Habiba Farrukh and Reham Mohamed and Aniket Nare and Antonio Bianchi and Z. Berkay Celik},\n  booktitle = {USENIX Security Symposium},\n  title     = {{LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality}},\n  year      = {2023},\n  pages = {1-18},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2023LocInUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ZBCAN: A Zero-Byte CAN Defense System.\n \n \n \n \n\n\n \n Khaled Serag, Rohit Bhatia, Vireshwar Kumar Akram Faqih, Muslum Ozgur Ozmen, Z. Berkay Celik, & Dongyan Xu.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"ZBCAN:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023ZBCANUSENIXSecurity,\n  author    = {Khaled Serag and Rohit Bhatia and Akram Faqih, Vireshwar Kumar and Muslum Ozgur Ozmen and Z. Berkay Celik and Dongyan Xu},\n  booktitle = {USENIX Security Symposium},\n  title     = {{ZBCAN: A Zero-Byte CAN Defense System}},\n  year      = {2023},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2023ZBCANUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems using Spatiotemporal Consistency.\n \n \n \n \n\n\n \n Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, & Ryan Gerdes.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"ThatPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023PercepGuardUSENIXSecurity,\n  title={{That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems using Spatiotemporal Consistency}},\n  author={Yanmao Man and Raymond Muller and Ming Li and Z. Berkay Celik and Ryan Gerdes},\n  booktitle={USENIX Security Symposium},\n  year={2023},\n  pages = {1-18},\n  url ={https://beerkay.github.io/papers/Berkay2023PercepGuardUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PatchVerif: Discovering Faulty Patches in Robotic Vehicles.\n \n \n \n \n\n\n \n Hyungsub Kim, M. Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, & Dongyan Xu.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"PatchVerif:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023PatchVerifUSENIXSecurity,\n  title={{PatchVerif: Discovering Faulty Patches in Robotic Vehicles}},\n  author = {Hyungsub Kim and M. Ozgur Ozmen and Z. Berkay Celik and Antonio Bianchi and Dongyan Xu},\n  booktitle={USENIX Security Symposium},\n  year={2023},\n  pages = {1-18},\n  url ={https://beerkay.github.io/papers/Berkay2023PatchVerifUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Rethinking Secure Pairing in Drone Swarms (Position Paper).\n \n \n \n \n\n\n \n Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, Antonio Bianchi, & Z. Berkay Celik.\n\n\n \n\n\n\n In Vehicle Security and Privacy (VehicleSec), collocated with NDSS, pages 1-5, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"RethinkingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023DroneSwarmPairingVehicleSec,\n  author    = {Muslum Ozgur Ozmen and Habiba Farrukh and Hyungsub Kim and Antonio Bianchi and Z. Berkay Celik},\n  title     = {Rethinking Secure Pairing in Drone Swarms (Position Paper)},\n  booktitle = {Vehicle Security and Privacy (VehicleSec), collocated with NDSS},\n  year={2023},\n  pages = {1-5},\n  url = {https://beerkay.github.io/papers/Berkay2023SwarmPairingVehicleSec.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Demo: Physically Hijacking Object Trackers.\n \n \n \n \n\n\n \n Raymond Muller, Yanmao Man, Z. Berkay Celik, Ryan Gerdes, & Ming Li.\n\n\n \n\n\n\n In Vehicle Security and Privacy (VehicleSec), collocated with NDSS, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Demo:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023AttractZoneDemoVehicleSec,\n  author = {Raymond Muller and Yanmao Man and Z. Berkay Celik and Ryan Gerdes and Ming Li},\n  title     = {{Demo}: Physically Hijacking Object Trackers},\n  booktitle = {Vehicle Security and Privacy (VehicleSec), collocated with NDSS},\n  year={2023},\n  url = {https://beerkay.github.io/papers/Berkay2023AttrrackZoneDemoVehicleSec.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Demo: Discovering Faulty Patches in Robotic Vehicle Control Software.\n \n \n \n \n\n\n \n Hyungsub Kim, M. Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, & Dongyan Xu.\n\n\n \n\n\n\n In Vehicle Security and Privacy (VehicleSec), collocated with NDSS, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"Demo:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023PatchVerifDemoVehicleSec,\n  author = {Hyungsub Kim and M. Ozgur Ozmen and Antonio Bianchi and Z. Berkay Celik and Dongyan Xu},\n  title     = {{Demo}: Discovering Faulty Patches in Robotic Vehicle Control Software},\n  booktitle = {Vehicle Security and Privacy (VehicleSec), collocated with NDSS},\n  year={2023},\n  url = {https://beerkay.github.io/papers/Berkay2023PatchVerifDemoVehicleSec.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches.\n \n \n \n \n\n\n \n Reham Mohamed, Habiba Farrukh, He Wang, Yidong Lu, & Z. Berkay Celik.\n\n\n \n\n\n\n Privacy Enhancing Technologies (PoPETs), 2023(1): 145-166. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"iStelan:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2023IstelanPETS,\n  author    = {Reham Mohamed and Habiba Farrukh  and He Wang and Yidong Lu and Z. Berkay Celik},\n  journal   = {Privacy Enhancing Technologies (PoPETs)},\n  title     = {{iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches}},\n  year      = {2023},\n  number    = {1},\n  pages     = {145-166},\n  volume    = {2023},\n  publisher = {Sciendo},\n  url = {https://beerkay.github.io/papers/Berkay2023IStelanPETS.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices.\n \n \n \n \n\n\n \n Habiba Farrukh, M. Ozgur Ozmen, F. Kerem Ors, & Z. Berkay Celik.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (IEEE S&P), pages 1-17, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"OnePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023IoTCupidOakland,\n  title={{One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices}},\n  author = {Habiba Farrukh and M. Ozgur Ozmen and F. Kerem Ors and Z. Berkay Celik},\n  booktitle={IEEE Symposium on Security and Privacy (IEEE S\\&P)},\n  year={2023},\n  pages = {1-17},\n  url = {https://beerkay.github.io/papers/Berkay2023IoTCupidOakland.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evasion Attacks and Defenses on Smart Home Physical Event Verification.\n \n \n \n \n\n\n \n M. Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, & Z. Berkay Celik.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), pages 1-18, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"EvasionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2023EvasionEVSNDDS,\n  author    = {M. Ozgur Ozmen and Ruoyu Song and Habiba Farrukh and Z. Berkay Celik},\n  booktitle = {Network and Distributed System Security Symposium (NDSS)},\n  title     = {{Evasion Attacks and Defenses on Smart Home Physical Event Verification}},\n  pages = {1-18},\n  year      = {2023},\n  url = {https://beerkay.github.io/papers/Berkay2023EvasionEVSNDDS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Discovering IoT Physical Channel Vulnerabilities.\n \n \n \n \n\n\n \n M. Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, & Xiangyu Zhang.\n\n\n \n\n\n\n In ACM Conference on Computer and Communications Security (CCS), pages 1-13, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DiscoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 54 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022PhysicalChannelCCS,\n  title={{Discovering IoT Physical Channel Vulnerabilities}},\n  author={M. Ozgur Ozmen and Xuansong Li and Andrew Chu and Z. Berkay Celik and Bardh Hoxha and Xiangyu Zhang},\n  booktitle={ACM Conference on Computer and Communications Security (CCS)},\n  year={2022},\n  pages = {1-13},\n  url = {https://beerkay.github.io/papers/Berkay2022IoTPhysicalCCS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Physical Hijacking Attacks against Object Trackers.\n \n \n \n \n\n\n \n Raymond Muller, Yanmao Man, Z. Berkay Celik, Ryan Gerdes, & Ming Li.\n\n\n \n\n\n\n In ACM Conference on Computer and Communications Security (CCS), pages 1-13, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"PhysicalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 43 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022PhysicalHijackingCCS,\n  title={{Physical Hijacking Attacks against Object Trackers}},\n  author={Raymond Muller and Yanmao Man and Z. Berkay Celik and Ryan Gerdes and Ming Li},\n  booktitle={ACM Conference on Computer and Communications Security (CCS)},\n  year={2022},\n  pages = {1-13},\n  url = {https://beerkay.github.io/papers/Berkay2022PhysicalHijackingCCS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.\n \n \n \n\n\n \n Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick McDaniel, Engin Kirda, & A. Selcuk Uluagac.\n\n\n \n\n\n\n ACM Transcations on Internet of Things (TIOT),1-30. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Berkay2022IoTAccessJournal,\nauthor = {Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and Aksu, Hidayet and McDaniel, Patrick and Kirda, Engin and Uluagac, A. Selcuk},\ntitle = {Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment},\njournal = {ACM Transcations on Internet of Things (TIOT)},\npages = {1-30},\nyear = {2022}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n IoTRepair: Flexible Fault Handling in Diverse IoT Deployments.\n \n \n \n\n\n \n Michael Norris, Z. Berkay Celik, Prasanna Venkatesh, Shulin Zhao, Patrick McDaniel, Anand Sivasubramaniam, & Gang Tan.\n\n\n \n\n\n\n ACM Transactions on Internet of Things (TIOT),1-32. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Berkay2022IoTRepairJournal,\n  title={{IoTRepair}: Flexible Fault Handling in Diverse IoT Deployments},\n  author = {Norris, Michael and Celik, Z. Berkay and Venkatesh, Prasanna and Zhao, Shulin and McDaniel, Patrick and Sivasubramaniam, Anand and Tan, Gang},\n  journal={ACM Transactions on Internet of Things (TIOT)},\n  pages = {1-32},\n  year={2022}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n POSTER: Evaluating Perception Attacks on Prediction and Planning of Autonomous Vehicles.\n \n \n \n\n\n \n Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, & Ryan Gerdes.\n\n\n \n\n\n\n In USENIX Security (Poster Session), 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022AVPerceptionAttackUSENIXPoster,\n  title={{POSTER}: Evaluating Perception Attacks on Prediction and Planning of Autonomous Vehicles},\n  author={Yanmao Man and Raymond Muller and Ming Li and Z. Berkay Celik and Ryan Gerdes},\n  booktitle={USENIX Security (Poster Session)},\n  year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Robust and Energy Efficient Malware Detection for Robotic Cyber-Physical Systems.\n \n \n \n \n\n\n \n Upinder Kaur, Z. Berkay Celik, & Richard Voyles.\n\n\n \n\n\n\n In International Conference on Cyber-Physical Systems (ICCPS), WIP Session (Abstract and Demo Session), 2022. \n \n\n\n\n
\n\n\n\n \n \n \"RobustPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022RoboticCPSICCPS,\n  title={{Robust and Energy Efficient Malware Detection for Robotic Cyber-Physical Systems}},\n  author={Upinder Kaur and Z. Berkay Celik and Richard Voyles},\n  booktitle={International Conference on Cyber-Physical Systems (ICCPS), WIP Session (Abstract and Demo Session)},\n  year={2022},\n  url = {https://beerkay.github.io/papers/Berkay2022RoboticCPSICCPS.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Behind the Tube: Exploitative Monetization of Content on YouTube.\n \n \n \n \n\n\n \n Andrew Chu, Arunasalam Arjun, Muslum Ozgur Ozmen, & Z. Berkay Celik.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"BehindPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022YoutubeUSENIXSecurity,\n  title={{Behind the Tube: Exploitative Monetization of Content on YouTube}},\n  author={Chu, Andrew and Arjun, Arunasalam and Muslum Ozgur Ozmen and Z. Berkay Celik},\n  booktitle={USENIX Security Symposium},\n  year={2022},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2022YoutubeUSENIXSecurity.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SARA: Secure Android Remote Authorization.\n \n \n \n \n\n\n \n Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, & Antonio Bianchi.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1-18, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"SARA:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022SaraUSENIXSecurity,\n  title={{SARA: Secure Android Remote Authorization}},\n  author={Imran, Abdullah and Farrukh, Habiba and Ibrahim, Muhammad and Z. Berkay Celik and Antonio Bianchi},\n  booktitle={USENIX Security Symposium},\n  year={2022},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2022SaraUSENIXSecurity.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.\n \n \n \n \n\n\n \n Hyungsub Kim, M. Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, & Dongyan Xu.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (IEEE S&P), pages 1-18, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"PGPatch:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022PGPatchOakland,\n  title={{PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles}},\n  author = {Hyungsub Kim and M. Ozgur Ozmen and Z. Berkay Celik and Antonio Bianchi and Dongyan Xu},\n  booktitle={IEEE Symposium on Security and Privacy (IEEE S\\&P)},\n  year={2022},\n  pages = {1-18},\n  url = {https://beerkay.github.io/papers/Berkay2022PGPatchIEEESP.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DriveTruth: Automated Autonomous Driving Dataset Generation for Security Applications.\n \n \n \n \n\n\n \n Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, & Ryan Gerdes.\n\n\n \n\n\n\n In International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS, pages 1-7, 2022. \n General Motors AutoDriving Security Award\n\n\n\n
\n\n\n\n \n \n \"DriveTruth:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022DriveTruthAutoSec,\n  author    = {Raymond Muller and Yanmao Man and Z. Berkay Celik and Ming Li and Ryan Gerdes},\n  title     = {{DriveTruth}: Automated Autonomous Driving Dataset Generation for Security Applications},\n  booktitle = {International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS},\n  pages = {1-7},\n  year={2022},\n  url = {https://beerkay.github.io/papers/Berkay2022DriveTruthAutoSec.pdf},\n  note = {General Motors AutoDriving Security Award}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Physical Layer Data Manipulation Attacks on the CAN Bus.\n \n \n \n \n\n\n \n Abdullah Zubair Mohammed, Yanmao Man, Ryan Gerdes, Ming Li, & Z. Berkay Celik.\n\n\n \n\n\n\n In International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS, pages 1-5, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"PhysicalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022PhyManipulationAutoSec,\n  author    = {Abdullah Zubair Mohammed and Yanmao Man and Ryan Gerdes and Ming Li and Z. Berkay Celik},\n  title     = {Physical Layer Data Manipulation Attacks on the {CAN} Bus},\n  booktitle = {International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS},\n  pages = {1-5},\n  year={2022},\n  url = {https://beerkay.github.io/papers/Berkay2022PhyManipulationAutoSec.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DEMO: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles.\n \n \n \n \n\n\n \n Hyungsub Kim, M. Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, & Dongyan Xu.\n\n\n \n\n\n\n In International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DEMO:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022PGFuzzPGPatch,\n  author = {Hyungsub Kim and M. Ozgur Ozmen and Antonio Bianchi and Z. Berkay Celik and Dongyan Xu},\n  title     = {{DEMO}: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles},\n  booktitle = {International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS},\n  year={2022},\n  url = {https://beerkay.github.io/papers/Berkay2022DemoBugPatchingRVs.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DEMO: Attacks on CAN Error Handling Mechanism.\n \n \n \n \n\n\n \n Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Mathias Payer, & Dongyan Xu.\n\n\n \n\n\n\n In International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DEMO:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022CANErrorAutoSec,\n  author    = {Serag, Khaled and Bhatia, Rohit and Kumar, Vireshwar and Celik, Z. Berkay and Mathias Payer and Xu, Dongyan},\n  title     = {{DEMO}: Attacks on CAN Error Handling Mechanism},\n  booktitle = {International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), collocated with NDSS},\n  year={2022},\n  url = {https://beerkay.github.io/papers/Berkay2022DemoCANAttack.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning.\n \n \n \n \n\n\n \n Siddharth Divi, Yi-Shan Lin, Habiba Farrukh, & Z Berkay Celik.\n\n\n \n\n\n\n In International Workshop on Federated Learning for User Privacy and Data Confidentiality (FL-ICML), pages 1-8, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"NewPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021ICMLFLPersonalizedFL,\n  title={{New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning}},\n  author={Divi, Siddharth and Lin, Yi-Shan and Farrukh, Habiba and Celik, Z Berkay},\n  booktitle={International Workshop on Federated Learning for User Privacy and Data Confidentiality (FL-ICML)},\n  year={2021},\n  pages = {1-8},\n  url = {https://beerkay.github.io/papers/Berkay2021ICMLFLPersonalizedFL.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Improving Container Security by Preventing Runtime Escapes.\n \n \n \n \n\n\n \n Michael Reeves, Dave (Jing) Tian, Antonio Bianchi, & Z. Berkay Celik.\n\n\n \n\n\n\n In IEEE Secure Development Conference (SecDev'21), pages 38-46, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021SecDevContainerSecurity,\n  title={{Towards Improving Container Security by Preventing Runtime Escapes}},\n  author={Michael Reeves and Dave (Jing) Tian and Antonio Bianchi and Z. Berkay Celik},\n  booktitle={IEEE Secure Development Conference (SecDev'21)},\n  year={2021}, \n  pages = {38-46},\n  url = {https://beerkay.github.io/papers/Berkay2021SecDevContainerSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n What Do you See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors.\n \n \n \n \n\n\n \n Yi-Shan Lin, Wen-Chuan Lee, & Z Berkay Celik.\n\n\n \n\n\n\n In SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pages 1027-1035, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"WhatPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021XAITrojan,\n  title={{What Do you See? Evaluation of Explainable Artificial Intelligence ({XAI}) Interpretability through Neural Backdoors}},\n  author={Lin, Yi-Shan and Lee, Wen-Chuan and Celik, Z Berkay},\n  booktitle={SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)},\n  pages = {1027-1035},\n  year={2021}, \n  comment  = {Acceptance Rate 15.4\\%},\n  url = {https://beerkay.github.io/papers/Berkay2021XAITrojan.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Safety Implications of Misordered Events and Commands in IoT Systems.\n \n \n \n \n\n\n \n Furkan Goksel, M. Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, & Z. Berkay Celik.\n\n\n \n\n\n\n In IEEE Security & Privacy, SafeThings Workshop, pages 235-241, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021PenserSafethings,\n  author    = {Furkan Goksel and M. Ozgur Ozmen and Michael Reeves and Basavesh Shivakumar and Z. Berkay Celik},\n  booktitle = {IEEE Security \\& Privacy, SafeThings Workshop},\n  title     = {{On the Safety Implications of Misordered Events and Commands in {IoT} Systems}},\n  pages = {235-241},\n  year      = {2021},\n  url = {https://beerkay.github.io/papers/Berkay2021PenserSafethings.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Survey on IoT platforms: Communication, security, and Privacy Perspectives.\n \n \n \n\n\n \n Leonardo Babun, Kyle Denney, Z Berkay Celik, Patrick McDaniel, & A Selcuk Uluagac.\n\n\n \n\n\n\n Computer Networks, 192: 108040. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Berkay2021IoTPlatformSurvey,\n  title={{A Survey on {IoT} platforms: Communication, security, and Privacy Perspectives}},\n  author={Babun, Leonardo and Denney, Kyle and Celik, Z Berkay and McDaniel, Patrick and Uluagac, A Selcuk},\n  journal={Computer Networks},\n  volume={192},\n  pages={108040},\n  year={2021},\n  publisher={Elsevier}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exposing New Vulnerabilities of Error Handling Mechanism in CAN.\n \n \n \n \n\n\n \n Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, & Dongyan Xu.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 4241-4258, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"ExposingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021CanoxUSENIXSecurity,\n  author    = {Serag, Khaled and Bhatia, Rohit and Kumar, Vireshwar and Celik, Z. Berkay and Xu, Dongyan},\n  booktitle = {USENIX Security Symposium},\n  title     = {{Exposing New Vulnerabilities of Error Handling Mechanism in {CAN}}},\n  comment   = {Acceptance Rate: 18.8\\%)},\n  pages = {4241-4258},\n  year      = {2021},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2021CanoxUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ATLAS: A Sequence-based Learning Approach for Attack Investigation.\n \n \n \n \n\n\n \n Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, & Dongyan Xu.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 3005-3022, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"ATLAS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021AtlasUSENIXSecurity,\n  author    = {Alsaheel, Abdulellah and Nan, Yuhong and Ma, Shiqing and Yu, Le and Walkup, Gregory and Celik, Z. Berkay and Zhang, Xiangyu and Xu, Dongyan},\n  booktitle = {USENIX Security Symposium},\n  title     = {{ATLAS: A Sequence-based Learning Approach for Attack Investigation}},\n  comment   = {Acceptance Rate: 18.8\\%)},\n  pages = {3005-3022},\n  year      = {2021},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2021AtlasUSENIXSecurity.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.\n \n \n \n \n\n\n \n Hyungsub Kim, M. Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, & Dongyan Xu.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), pages 1-18, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"PGFUZZ:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021PGFuzzNDSS,\n  author    = {Hyungsub Kim and M. Ozgur Ozmen and Antonio Bianchi and Z. Berkay Celik and Dongyan Xu},\n  booktitle = {Network and Distributed System Security Symposium (NDSS)},\n  title     = {{PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles}},\n  pages = {1-18},\n  comment   = {Acceptance Rate: 15.2\\%)},\n  year      = {2021},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2021PGFuzzNDSS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evading Voltage-Based Intrusion Detection on Automotive CAN.\n \n \n \n \n\n\n \n Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, & Dongyan Xu.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), pages 1-17, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"EvadingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021DuetNDSS,\n  author    = {Bhatia, Rohit and Kumar, Vireshwar and Serag, Khaled and Celik, Z. Berkay and Payer, Mathias and Xu, Dongyan},\n  booktitle = {Network and Distributed System Security Symposium (NDSS)},\n  title     = {{Evading Voltage-Based Intrusion Detection on Automotive CAN}},\n  pages = {1-17},\n  comment   = {Acceptance Rate: 15.2\\%)},\n  year      = {2021},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2021DuetNDSS.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n S3: Side-channel Attack on Stylus Pencil Through Sensors.\n \n \n \n \n\n\n \n Habiba Farrukh, Tinghan Yang, Yuxuan Yin, Hanwen Xu, He Wang, & Z. Berkay Celik.\n\n\n \n\n\n\n ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp),1-25. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"S3:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{berkay2021S3UbiComp,\n  author    = {Habiba Farrukh and Tinghan Yang and Yuxuan Yin and Hanwen Xu and He Wang and Z. Berkay Celik},\n  journal   = {ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)},\n  title     = {{S3: Side-channel Attack on Stylus Pencil Through Sensors}},\n  pages={1-25},\n  year      = {2021},\n  publisher = {ACM New York, NY, USA},\n  url = {https://beerkay.github.io/papers/berkay2021S3UbiComp.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Real-time analysis of privacy-(un) aware IoT applications.\n \n \n \n \n\n\n \n Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, & A. Selcuk Uluagac.\n\n\n \n\n\n\n Privacy Enhancing Technologies (PoPETs), 2021(1): 145-166. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Real-timePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2021DaintPETS2021,\n  author    = {Leonardo Babun and Z. Berkay Celik and Patrick McDaniel and A. Selcuk Uluagac},\n  journal   = {Privacy Enhancing Technologies (PoPETs)},\n  title     = {{Real-time analysis of privacy-(un) aware IoT applications}},\n  year      = {2021},\n  number    = {1},\n  pages     = {145-166},\n  comment   = {Acceptance Rate: 18.6\\%},\n  volume    = {2021},\n  publisher = {Sciendo},\n  url = {https://beerkay.github.io/papers/Berkay2021DaintPETS2021.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.\n \n \n \n \n\n\n \n Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, & Selcuk Uluagac.\n\n\n \n\n\n\n In ACM/IEEE Conference on Internet of Things Design and Implementation (IoTDI), pages 53-66, April 2021. \n \n\n\n\n
\n\n\n\n \n \n \"Sentinel:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2021SentinelIoTDI,\n  author    = {Adrien Cosson and Amit Kumar Sikder and Leonardo Babun and Z. Berkay Celik and Patrick McDaniel and Selcuk Uluagac},\n  booktitle = {ACM/IEEE Conference on Internet of Things Design and Implementation (IoTDI)},\n  title     = {{Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information}},\n  pages={53-66},\n  year      = {2021},\n  month     = {April},\n  url = {https://beerkay.github.io/papers/Berkay2021SentinelIoTDI.pdf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities.\n \n \n \n \n\n\n \n Paul M. Berges, Basavesh Shivakumar, Timothy Graziano, Ryan Gerdes, & Z. Berkay Celik.\n\n\n \n\n\n\n In IEEE Conference on Communications and Network Security (CNS), Workshop on Cyber-physical Systems Security (CPS-Sec), pages 1-6, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2020TCASCNS,\n  author    = {Berges, Paul M. and Shivakumar, Basavesh and Graziano, Timothy and Gerdes, Ryan and Celik, Z. Berkay},\n  booktitle = {IEEE Conference on Communications and Network Security (CNS), Workshop on Cyber-physical Systems Security (CPS-Sec)},\n  title     = {{On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities}},\n  pages={1-6},\n  year      = {2020},\n  url = {https://beerkay.github.io/papers/Berkay2020TCASCNS.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n IoTRepair: Systematically addressing device faults in commodity IoT.\n \n \n \n \n\n\n \n Michael Norris, Z. Berkay Celik, Prasanna Venkatesh, Shulin Zhao, Patrick McDaniel, Anand Sivasubramaniam, & Gang Tan.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Internet-of-Things Design and Implementation (IoTDI), pages 142–148, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"IoTRepair:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2020IoTRepairIoTDI,\n  author    = {Norris, Michael and Celik, Z. Berkay and Venkatesh, Prasanna and Zhao, Shulin and McDaniel, Patrick and Sivasubramaniam, Anand and Tan, Gang},\n  booktitle = {IEEE/ACM International Conference on Internet-of-Things Design and Implementation (IoTDI)},\n  title     = {{IoTRepair: Systematically addressing device faults in commodity {IoT}}},\n  year      = {2020},\n  pages     = {142--148},\n  url = {https://beerkay.github.io/papers/Berkay2020IoTRepairIoTDI.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home.\n \n \n \n \n\n\n \n Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, & A. Selcuk Uluagac.\n\n\n \n\n\n\n In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pages 1–12, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"KRATOS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2020KratosWISEC,\n  author    = {Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and McDaniel, Patrick and Kirda, Engin and Uluagac, A. Selcuk},\n  title     = {{KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home}},\n  booktitle = {ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},\n  pages={1--12},\n  year      = {2020},\n  url = {https://beerkay.github.io/papers/Berkay2020KratosWISEC.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges.\n \n \n \n \n\n\n \n Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, & Patrick McDaniel.\n\n\n \n\n\n\n ACM Computing Surveys (CSUR), 52(4): 1–30. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"ProgramPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2019IoTProgramAnalysisCSUR,\n  author  = {Z. Berkay Celik and Earlence Fernandes and Eric Pauley and Gang Tan and Patrick McDaniel},\n  journal = {ACM Computing Surveys (CSUR)},\n  title   = {{Program Analysis of Commodity {IoT} Applications for Security and Privacy: Opportunities and Challenges}},\n  year    = {2019},\n  volume={52},\n  number={4},\n  pages={1--30},\n  url = {https://beerkay.github.io/papers/Berkay2019IoTProgramAnalysisCSUR.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Verifying IoT Safety and Security in Physical Spaces.\n \n \n \n \n\n\n \n Z. Berkay Celik, Patrick McDaniel, Gang Tan, Leonardo Babun, & Selcuk Uluagac.\n\n\n \n\n\n\n IEEE Security & Privacy Magazine, 17(5): 30-37. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"VerifyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2019IoTIEEESPMagazine,\n  author    = {Z. Berkay Celik and Patrick McDaniel and Gang Tan and Leonardo Babun and Selcuk Uluagac},\n  journal   = {IEEE Security \\& Privacy Magazine},\n  title     = {{Verifying {IoT} Safety and Security in Physical Spaces}},\n  volume={17},\n  number={5},\n  pages={30-37},\n  year={2019},\n  url = {https://beerkay.github.io/papers/Berkay2019IoTIEEESPMagazine.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Curie: Policy-based Secure Data Exchange.\n \n \n \n \n\n\n \n Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, A. Selcuk Uluagac, & Patrick McDaniel.\n\n\n \n\n\n\n In ACM Conference on Data and Applications Security (CODASPY), pages 121–132, Dallas, TX, March 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Curie:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2019CurieCODASPY,\n  author    = {Z. Berkay Celik and Abbas Acar and Hidayet Aksu and Ryan Sheatsley and A. Selcuk Uluagac and Patrick McDaniel},\n  booktitle = {ACM Conference on Data and Applications Security (CODASPY)},\n  title     = {{Curie: Policy-based Secure Data Exchange}},\n  year      = {2019},\n  pages     = {121--132},\n  address   = {Dallas, TX},\n  month     = {March},\n  url = {https://beerkay.github.io/papers/Berkay2019CurieCODASPY.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.\n \n \n \n \n\n\n \n Z. Berkay Celik, Gang Tan, & Patrick McDaniel.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), pages 1-15, San Diego, CA, February 2019. \n \n\n\n\n
\n\n\n\n \n \n \"IoTGuard:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2019IoTGuardNDSS,\n  author    = {Z. Berkay Celik and Gang Tan and Patrick McDaniel},\n  booktitle = {Network and Distributed System Security Symposium (NDSS)},\n  title     = {{{IoTGuard}: Dynamic Enforcement of Security and Safety Policy in Commodity {IoT}}},\n  pages= {1-15},\n  year      = {2019},\n  address   = {San Diego, CA},\n  month     = {February},\n  comment   = {acceptance rate=17\\%},\n  owner     = {berkay},\n  timestamp = {2018.10.04},\n  url = {https://beerkay.github.io/papers/Berkay2019IoTGuardNDSS.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n DEMO: Sensitive Information Tracking for IoT Apps.\n \n \n \n\n\n \n Leonardo Babun, Z. Berkay Celik, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, & A. Selcuk Uluagac.\n\n\n \n\n\n\n In Annual Research Conference at the University of Florida's Florida Institute of Cybersecurity Research (FICS), Gainesville, 2018. \n Best DEMO award\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2022SaintDemoFICS,\n  author = {Leonardo Babun and Z. Berkay Celik and Amit K. Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},\n  title     = {{DEMO}: Sensitive Information Tracking for IoT Apps},\n  booktitle = {Annual Research Conference at the University of Florida's Florida Institute of Cybersecurity Research (FICS), Gainesville},\n  year={2018},\n  note = {Best DEMO award}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detection under Privileged Information.\n \n \n \n \n\n\n \n Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, & Ananthram Swami.\n\n\n \n\n\n\n In ACM Asia Conference on Computer and Communications Security (ASIACCS), pages 199-206, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"DetectionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2018PrivilegedASIACCS,\n  author    = {Z. Berkay Celik and Patrick McDaniel and Rauf Izmailov and Nicolas Papernot and Ryan Sheatsley and Raquel Alvarez and Ananthram Swami},\n  booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},\n  title     = {{Detection under Privileged Information}},\n  pages={199-206},\n  year      = {2018},\n  url = {https://beerkay.github.io/papers/Berkay2018PrivilegedASIACCS.pdf}\n }\n\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Extending Detection with Privileged Information via Generalized Distillation.\n \n \n \n \n\n\n \n Z. Berkay Celik, & Patrick McDaniel.\n\n\n \n\n\n\n In IEEE Security & Privacy Workshop on Deep Learning and Security (IEEE S&P DLS), pages 83–88, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"ExtendingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2018DistillationSPDLS,\n  author    = {Z. Berkay Celik and Patrick McDaniel},\n  booktitle = {IEEE Security \\& Privacy Workshop on Deep Learning and Security (IEEE S\\&P DLS)},\n  title     = {{Extending Detection with Privileged Information via Generalized Distillation}},\n  pages={83--88},\n  year      = {2018},\n  url = {https://beerkay.github.io/papers/Berkay2018DistillationSPDLS.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Soteria: Automated IoT Safety and Security Analysis.\n \n \n \n \n\n\n \n Z. Berkay Celik, Patrick McDaniel, & Gang Tan.\n\n\n \n\n\n\n In USENIX Annual Technical Conference (USENIX ATC), pages 147–158, Boston, MA, July 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Soteria:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2018SoteriaUSENIXATC,\n  author    = {Z. Berkay Celik and Patrick McDaniel and Gang Tan},\n  booktitle = {USENIX Annual Technical Conference (USENIX ATC)},\n  title     = {{Soteria: Automated {IoT} Safety and Security Analysis}},\n  pages={147--158},\n  year      = {2018},\n  address   = {Boston, MA},\n  month     = {July},\n  owner     = {berkay},\n  timestamp = {2018.04.19},\n  url = {https://beerkay.github.io/papers/Berkay2018SoteriaUSENIXATC.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Sensitive Information Tracking in Commodity IoT.\n \n \n \n \n\n\n \n Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, & A. Selcuk Uluagac.\n\n\n \n\n\n\n In USENIX Security Symposium, pages 1687–1704, Baltimore, MD, August 2018. \n \n\n\n\n
\n\n\n\n \n \n \"SensitivePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2018SaintUSENIXSecurity,\n  author    = {Z. Berkay Celik and Leonardo Babun and Amit K. Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},\n  booktitle = {USENIX Security Symposium},\n  title     = {{Sensitive Information Tracking in Commodity {IoT}}},\n  pages     = {1687--1704},\n  year      = {2018},\n  address   = {Baltimore, MD},\n  month     = {August},\n  owner     = {berkay},\n  url = {https://beerkay.github.io/papers/Berkay2018SaintUSENIXSecurity.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Malware Modeling and Experimentation through Parameterized Behavior.\n \n \n \n \n\n\n \n Z. Berkay Celik, Patrick McDaniel, & Thomas Bowen.\n\n\n \n\n\n\n Journal of Defense Modeling and Simulation (JDMS), 15(1): 31–48. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"MalwarePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2017MalwareModellingJDMS,\n  author  = {Celik, Z. Berkay and McDaniel, Patrick and Bowen, Thomas},\n  journal = {Journal of Defense Modeling and Simulation (JDMS)},\n  title   = {{Malware Modeling and Experimentation through Parameterized Behavior}},\n  volume={15},\n  number={1},\n  pages={31--48},\n  year={2018},\n  url     = {https://beerkay.github.io/papers/berkay2017MalwareModellingJDMS.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout.\n \n \n \n \n\n\n \n Sayed Saghaian, Tom La Porta, Trent Jaeger, Z. Berkay Celik, & Patrick McDaniel.\n\n\n \n\n\n\n In International Conference on Security and Privacy in Communication Systems (SecureComm), pages 192–212, 2018. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"Mission-orientedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2018OmodelSecureComm,\n  author    = {Sayed Saghaian and Tom La Porta and Trent Jaeger and Z. Berkay Celik and Patrick McDaniel},\n  booktitle = {International Conference on Security and Privacy in Communication Systems (SecureComm)},\n  title     = {{Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout}},\n  pages     = {192--212},\n  year      = {2018},\n  comment   = {Best Paper Award},\n  url     = {https://beerkay.github.io/papers/berkay2018OmodelSecureComm.pdf},\n  note = {Best Paper Award}\n}\n\n\n \n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Achieving Secure and Differentially Private Computations in Multiparty Settings.\n \n \n \n \n\n\n \n Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, & Patrick McDaniel.\n\n\n \n\n\n\n In IEEE Symposium on Privacy-Aware Computing (PAC), pages 49-59, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"AchievingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2017SecurePrivatePAC,\n  author    = {Abbas Acar and Z. Berkay Celik and Hidayet Aksu and A. Selcuk Uluagac and Patrick McDaniel},\n  booktitle = {IEEE Symposium on Privacy-Aware Computing (PAC)},\n  title     = {{Achieving Secure and Differentially Private Computations in Multiparty Settings}},\n  year      = {2017},\n  pages     ={49-59},\n  url     = {https://beerkay.github.io/papers/Berkay2017SecurePrivatePAC.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Patient-Driven Privacy Control through Generalized Distillation.\n \n \n \n \n\n\n \n Z. Berkay Celik, David Lopez-Paz, & Patrick McDaniel.\n\n\n \n\n\n\n In IEEE Symposium on Privacy-Aware Computing (PAC), pages 1-12, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Patient-DrivenPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2017PatientPrivacyPAC,\n  author    = {Celik, Z. Berkay and Lopez-Paz, David and McDaniel, Patrick},\n  booktitle = {IEEE Symposium on Privacy-Aware Computing (PAC)},\n  title     = {{Patient-Driven Privacy Control through Generalized Distillation}},\n  pages     = {1-12},\n  year      = {2017},\n  url     = {https://beerkay.github.io/papers/Berkay2017PatientPrivacyPAC.pdf}  \n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Feature Cultivation in Privileged Information-augmented Detection.\n \n \n \n \n\n\n \n Z. Berkay Celik, Patrick McDaniel, & Rauf Izmailov.\n\n\n \n\n\n\n In International Workshop on Security And Privacy Analytics (Codaspy, IWSPA) (Invited Paper), pages 73–80, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"FeaturePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2017PrivilegedCultivationIWSPA,\n  author    = {Z. Berkay Celik and Patrick McDaniel and Rauf Izmailov},\n  booktitle = {International Workshop on Security And Privacy Analytics (Codaspy, IWSPA) (Invited Paper)},\n  title     = {{Feature Cultivation in Privileged Information-augmented Detection}},\n  pages     = {73--80},\n  year      = {2017},\n  owner     = {berkay},\n  timestamp = {2017.01.28},\n  url     = {https://beerkay.github.io/papers/Berkay2017PrivilegedCultivationIWSPA.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Practical Black-Box Attacks against Machine Learning.\n \n \n \n \n\n\n \n Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, & Ananthram Swami.\n\n\n \n\n\n\n In ACM Asia Conference on Computer and Communications Security (ASIACCS), pages 506-519, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2017practicalDLASIACCS,\n  Title                    = {Practical Black-Box Attacks against Machine Learning},\n  Author                   = {Papernot, Nicolas and McDaniel, Patrick and Goodfellow, Ian and Jha, Somesh and Celik, Z. Berkay and Swami, Ananthram},\n  Booktitle                = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},\n  Year                     = {2017},\n  pages                    = {506-519},\n  Url                      =  {https://beerkay.github.io/papers/Berkay2017practicalDLASIACCS.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The Limitations of Deep Learning in Adversarial Settings.\n \n \n \n \n\n\n \n Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, & Ananthram Swami.\n\n\n \n\n\n\n In IEEE European Symposium on Security and Privacy (EuroS&P), pages 372–387, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2016DLLimitationEuroSP,\n  author    = {Papernot, Nicolas and McDaniel, Patrick and Jha, Somesh and Fredrikson, Matt and Celik, Z. Berkay and Swami, Ananthram},\n  booktitle = {IEEE European Symposium on Security and Privacy (EuroS\\&P)},\n  title     = {{The Limitations of Deep Learning in Adversarial Settings}},\n  pages={372--387},\n  year      = {2016},\n  url     = {https://beerkay.github.io/papers/Berkay2016DLLimitationEuroSP.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Machine Learning in Adversarial Settings.\n \n \n \n \n\n\n \n Patrick McDaniel, Nicolas Papernot, & Z. Berkay Celik.\n\n\n \n\n\n\n IEEE Security & Privacy Magazine, 14(3): 68–72. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"MachinePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{Berkay2016adversarialSPMagazine,\n  author  = {McDaniel, Patrick and Papernot, Nicolas and Celik, Z. Berkay},\n  journal = {IEEE Security \\& Privacy Magazine},\n  title   = {{Machine Learning in Adversarial Settings}},\n  year    = {2016},\n  number  = {3},\n  volume  = {14},\n  pages   = {68--72},\n  url     = {https://beerkay.github.io/papers/Berkay2016adversarialSPMagazine.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mapping Sample Scenarios to Operational Models.\n \n \n \n \n\n\n \n Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick McDaniel, Jeff Rowe, RobertJ. Walls, Karl Levitt, Novella Bartolini, Thomas La Porta, & Ritu Chadha.\n\n\n \n\n\n\n In IEEE International Conference for Military Communications (MILCOM), pages 7–12, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"MappingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2016mappingOmodelMilcom,\n  author    = {Celik, Z. Berkay and Hu, Nan and Li, Yun and Papernot, Nicolas and McDaniel, Patrick and Rowe, Jeff and Walls, RobertJ. and Levitt, Karl and Bartolini, Novella and {La Porta}, Thomas and Chadha, Ritu},\n  booktitle = {IEEE International Conference for Military Communications (MILCOM)},\n  title     = {{Mapping Sample Scenarios to Operational Models}},\n  pages     = {7--12},\n  year      = {2016},\n  url       = {https://beerkay.github.io/papers/Berkay2016mappingOmodelMilcom.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Proof and Implementation of Algorithmic Realization of Learning Using Privileged Information (LUPI) Paradigm: SVM+.\n \n \n \n \n\n\n \n Z. Berkay Celik, Rauf Izmailov, & Patrick McDaniel.\n\n\n \n\n\n\n Technical Report NAS-TR-0187-2015, Penn State University, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"ProofPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@TechReport{Berkay2015proofTR,\n  author      = {Celik, Z. Berkay and Izmailov, Rauf and McDaniel, Patrick},\n  institution = {Penn State University},\n  title       = {{Proof and Implementation of Algorithmic Realization of Learning Using Privileged Information (LUPI) Paradigm: SVM+}},\n  year        = {2015},\n  pages =  {1--6},\n  number      = {NAS-TR-0187-2015},\n  journal     = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA},\n  publisher   = {SIIS Lab},\n  url       = {https://beerkay.github.io/papers/Berkay2015proofTR.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Malware Traffic Detection using Tamper Resistant Features.\n \n \n \n \n\n\n \n Z. Berkay Celik, Robert J. Walls, Patrick McDaniel, & Ananthram Swami.\n\n\n \n\n\n\n In IEEE Internatonal Conference for Military Communications (MILCOM), pages 330-335, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"MalwarePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2015malwareMILCOM,\n  author    = {Z. Berkay Celik and Robert J. Walls and Patrick McDaniel and Ananthram Swami},\n  booktitle = {IEEE Internatonal Conference for Military Communications (MILCOM)},\n  title     = {Malware Traffic Detection using Tamper Resistant Features},\n  pages={330-335},\n  year      = {2015},\n  url       = {https://beerkay.github.io/papers/Berkay2015malwareMILCOM.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Detection of Fast-flux Networks using Various DNS Feature Sets.\n \n \n \n \n\n\n \n Z. Berkay Celik, & Sema Oktug.\n\n\n \n\n\n\n In IEEE Computers and Communications Symposium (ISCC), pages 868-873, 2013. \n \n\n\n\n
\n\n\n\n \n \n \"DetectionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2013fastFluxISCC,\n  author    = {Z. Berkay Celik and Sema Oktug},\n  booktitle = {IEEE Computers and Communications Symposium (ISCC)},\n  title     = {{Detection of Fast-flux Networks using Various DNS Feature Sets}},\n  pages     ={868-873},\n  year      = {2013}, \n  url       = {https://beerkay.github.io/papers/Berkay2013fastFluxISCC.pdf}\n}\n\n \n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Salting Public Traces with Attack Traffic to Test Flow Classifiers.\n \n \n \n \n\n\n \n Z. Berkay Celik, Jayaram Raghuram, George Kesidis, & David J. Miller.\n\n\n \n\n\n\n In USENIX Cyber Security and Experimentation (CSET) Workshop, pages 1-8, 2011. \n \n\n\n\n
\n\n\n\n \n \n \"SaltingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@InProceedings{Berkay2011saltingCSET,\n  author    = {Z. Berkay Celik and Jayaram Raghuram and George Kesidis and David J. Miller},\n  booktitle = {USENIX Cyber Security and Experimentation (CSET) Workshop},\n  title     = {{Salting Public Traces with Attack Traffic to Test Flow Classifiers}},\n  pages     =  {1-8},\n  year      = {2011},\n  url       = {https://beerkay.github.io/papers/Berkay2011saltingCSET.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);