EE515 Paper Presentation
This survey is needed to assign papers for presentation in each class.
Please mark your preference.
You should select AT LEAST FIVE (>=5) candidate papers with positive score. (i.e. 1-5)
0 means that you cannot present this paper.
1 means that if avoidable, you don't want to present this paper.
5 means that you really want to present this paper.
In other words, the smaller the value is, the less you want to present this paper. You can read the paper from the class web sites.
Sign in to Google to save your progress. Learn more
What is your name? *
What is your student ID number? *
(9/16) Dolphin Attack: Inaudible Voice Commands
Clear selection
(9/23) Exploiting the DRAM rowhammer bug to gain kernel privileges
Clear selection
(9/28) On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces
Clear selection
(9/28) Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Clear selection
(9/30) Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN
Clear selection
(9/30) Losing control of the Internet: Using the data plane to attack the control plane
Clear selection
(10/5) Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Clear selection
(10/5) Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Clear selection
(10/7) On Limitations of Friendly Jamming for Confidentiality
Clear selection
(10/7) UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Clear selection
(10/21) Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Clear selection
(10/21) GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
Clear selection
(10/26) Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
Clear selection
(10/26) Breaking LTE on Layer Two
Clear selection
(11/2) BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
Clear selection
(11/2) Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
Clear selection
(11/4) Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
Clear selection
(11/4) Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
Clear selection
(11/9) Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
Clear selection
(11/9) The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
Clear selection
(11/11) Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
Clear selection
(11/11) Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Clear selection
(11/23) Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
Clear selection
(11/23) Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Clear selection
(11/25) Robust De-anonymization of Large Sparse Datasets
Clear selection
(11/25) De-anonymizing Programmers via Code Stylometry
Clear selection
(11/30) Explaining and harnessing adversarial examples
Clear selection
(11/30) Robust Physical-World Attacks on Deep Learning Visual Classification
Clear selection
(12/2) Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Clear selection
(12/2) Model inversion attacks that exploit confidence information and basic countermeasures
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy