Biblio

Export 12 results:
Filters: Author is Z. Berkay Celik  [Clear All Filters]
2022
Chu A, Arunasalam A, Ozmen MOzgur, Z. Celik B.  2022.  Behind the Tube: Exploitative Monetization of Content on YouTube. 31st USENIX Security Symposium (USENIX Security 22). :2171--2188.
Imran A, Farrukh H, Ibrahim M, Z. Celik B, Bianchi A.  2022.  SARA: Secure Android Remote Authorization. 31st USENIX Security Symposium (USENIX Security 22). :1561--1578.
2021
Alsaheel A, Nan Y, Ma S, Yu L, Walkup G, Z. Celik B, Zhang X, Xu D.  2021.  ATLAS: A Sequence-based Learning Approach for Attack Investigation. 30th USENIX Security Symposium (USENIX Security 21). :3005--3022.
Serag K, Bhatia R, Kumar V, Z. Celik B, Xu D.  2021.  Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 30th USENIX Security Symposium (USENIX Security 21). :4241--4258.
2018
Z. Celik B, Babun L, Sikder AKumar, Aksu H, Tan G, McDaniel P, A. Uluagac S.  2018.  Sensitive Information Tracking in Commodity IoT. 27th USENIX Security Symposium (USENIX Security 18). :1687--1704.
Z. Celik B, McDaniel P, Tan G.  2018.  Soteria: Automated IoT Safety and Security Analysis. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :147--158.
2011
Z. Celik B, Raghuram J, Kesidis G, Miller DJ.  2011.  Salting Public Traces with Attack Traffic to Test Flow Classifiers. 4th Workshop on Cyber Security Experimentation and Test (CSET 11).