Improved proxy re-encryption schemes with applications to secure distributed storage G Ateniese, K Fu, M Green, S Hohenberger ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006 | 2115 | 2006 |
Plutus: Scalable secure file sharing on untrusted storage M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu 2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003 | 1154 | 2003 |
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008 | 1086 | 2008 |
Power-up SRAM state as an identifying fingerprint and source of true random numbers DE Holcomb, WP Burleson, K Fu IEEE Transactions on Computers 58 (9), 1198-1210, 2008 | 1025 | 2008 |
Private memoirs of a smart meter A Molina-Markham, P Shenoy, K Fu, E Cecchet, D Irwin Proceedings of the 2nd ACM workshop on embedded sensing systems for energy …, 2010 | 651 | 2010 |
Security and privacy for implantable medical devices D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel IEEE pervasive computing 7 (1), 30-39, 2008 | 612 | 2008 |
Adversarial sensor attack on lidar-based perception in autonomous driving Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ... Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 538 | 2019 |
Ghost talk: Mitigating EMI signal injection attacks against analog sensors DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu 2013 IEEE Symposium on Security and Privacy, 145-159, 2013 | 518 | 2013 |
They can hear your heartbeats: Non-invasive security for implantable medical devices S Gollakota, H Hassanieh, B Ransford, D Katabi, K Fu Proceedings of the ACM SIGCOMM 2011 conference, 2-13, 2011 | 492 | 2011 |
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags DE Holcomb, WP Burleson, K Fu Proceedings of the Conference on RFID Security 7 (2), 01, 2007 | 488 | 2007 |
Mementos: System support for long-running computation on RFID-scale devices B Ransford, J Sorber, K Fu Proceedings of the sixteenth international conference on Architectural …, 2011 | 473 | 2011 |
Fast and secure distributed read-only file system K Fu, MF Kaashoek, D Mazieres ACM Transactions on Computer Systems (TOCS) 20 (1), 1-24, 2002 | 434 | 2002 |
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks T Trippel, O Weisse, W Xu, P Honeyman, K Fu 2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017 | 333 | 2017 |
The dos and don'ts of client authentication on the web K Fu, E Sit, K Smith, N Feamster 10th USENIX Security Symposium (USENIX Security 01), 2001 | 265 | 2001 |
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. T Denning, K Fu, T Kohno HotSec, 2008 | 208 | 2008 |
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu 29th USENIX Security Symposium (USENIX Security 20), 2631-2648, 2020 | 196 | 2020 |
{WattsUpDoc}: Power side channels to nonintrusively discover untargeted malware on embedded medical devices SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu 2013 USENIX Workshop on Health Information Technologies (HealthTech 13), 2013 | 193 | 2013 |
Group sharing and random access in cryptographic storage file systems KE Fu Massachusetts Institute of Technology, 1999 | 182 | 1999 |
Design challenges for secure implantable medical devices W Burleson, SS Clark, B Ransford, K Fu Proceedings of the 49th annual design automation conference, 12-17, 2012 | 176 | 2012 |
Secure Software Updates: Disappointments and New Challenges. A Bellissimo, J Burgess, K Fu HotSec, 2006 | 159 | 2006 |