Digital Twin of Cyber-Physical CNC for Smart Manufacturing B Williams, G Ciocarlie, K Saleeby, M Ismail, C Mulkey 2023 IEEE 3rd International Conference on Digital Twins and Parallel …, 2023 | 1 | 2023 |
Smart privacy and controlled exposure on blockchains G Ciocarlie, K Eldefrawy, T Lepoint US Patent 11,741,247, 2023 | 3 | 2023 |
Modeling cyber-physical attack paths in the internet-of-things GF Ciocarlie, I Agadakos, CY Chen, M Campanelli, P Anantharaman, ... US Patent 11,729,196, 2023 | | 2023 |
Securing Critical Infrastructure Across Cyber and Physical Dimensions GF Ciocarlie, J Zhou IEEE Security & Privacy 21 (4), 9-9, 2023 | 1 | 2023 |
Intrusion detection via semantic fuzzing and message provenance G Ciocarlie, ME Locasto, C Corbett, D Jovanovic US Patent 11,689,544, 2023 | 13 | 2023 |
Adversarial scratches: Deployable attacks to CNN classifiers L Giulivi, M Jere, L Rossi, F Koushanfar, G Ciocarlie, B Hitaj, G Boracchi Pattern Recognition 133, 108985, 2023 | 13 | 2023 |
Building Blocks for Secure and Prosperous Defense Critical Supply Chains: A Case Study from Microelectronics HD Grimes, GF Ciocarlie, RJ Butler, WE Austad Idaho National Laboratory (INL), Idaho Falls, ID (United States), 2022 | | 2022 |
autoMPI: automated multiple perspective attack investigation with semantics aware execution partitioning M Alhanahnah, S Ma, A Gehani, GF Ciocarlie, V Yegneswaran, S Jha, ... IEEE Transactions on Software Engineering 49 (4), 2761-2775, 2022 | | 2022 |
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing HD Grimes, GF Ciocarlie, B Yu, D Wijesekera, G Shannon, W Austad, ... IEEE Security & Privacy 20 (6), 53-65, 2022 | 1 | 2022 |
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World A Maiti, AR Sadeghi, G Ciocarlie, P Tague Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | | 2022 |
Everything is Connected: Security and Reliability for Critical Infrastructure GF Ciocarlie Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | | 2022 |
A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation M Jablonski, B Yu, GF Ciocarlie, P Costa Computer 54 (9), 59-71, 2021 | 3 | 2021 |
Trace: Enterprise-wide provenance tracking for real-time apt detection H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ... IEEE Transactions on Information Forensics and Security 16, 4363-4376, 2021 | 34 | 2021 |
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ... NDSS, 2021 | 33 | 2021 |
On uncertainty and robustness in large-scale intelligent data fusion systems BM Marlin, T Abdelzaher, G Ciocarlie, AD Cobb, M Dennison, B Jalaian, ... 2020 IEEE Second International Conference on Cognitive Machine Intelligence …, 2020 | 10 | 2020 |
ct-fuzz: Fuzzing for Timing Leaks S He, M Emmi, G Ciocarlie 2020 IEEE 13th International Conference on Software Testing, Validation and …, 2020 | 38 | 2020 |
IoTHound: environment-agnostic device identification and monitoring P Anantharaman, L Song, I Agadakos, G Ciocarlie, B Copos, U Lindqvist, ... Proceedings of the 10th International Conference on the Internet of Things, 1-9, 2020 | 13 | 2020 |
Securing Smart Cities: Implications and Challenges I Agadakos, P Anantharaman, GF Ciocarlie, B Copos, M Emmi, T Lepoint, ... Modeling and Design of Secure Internet of Things, 185-215, 2020 | 1 | 2020 |
Middleware to automatically verify smart contracts on blockchains G Ciocarlie, K Eldefrawy, T Lepoint, JN Laserna, A Hajdu, D Jovanovic US Patent App. 16/227,728, 2020 | 3 | 2020 |
Behavioral simulation for smart contracts SM Beillahi, G Ciocarlie, M Emmi, C Enea Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 13 | 2020 |