关注
Hadjer Benkraouda
Hadjer Benkraouda
在 illinois.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
E Barka, CA Kerrache, H Benkraouda, K Shuaib, F Ahmad, F Kurugollu
Transactions on Emerging Telecommunications Technologies 33 (8), e3706, 2022
562022
Facehack: Triggering backdoored facial recognition systems using facial characteristics
E Sarkar, H Benkraouda, M Maniatakos
arXiv preprint arXiv:2006.11623, 2020
352020
{ICSFuzz}: Manipulating {I/Os} and repurposing binary code to enable instrumented fuzzing in {ICS} control applications
D Tychalas, H Benkraouda, M Maniatakos
30th USENIX Security Symposium (USENIX Security 21), 2847-2862, 2021
302021
I came, I saw, I hacked: Automated generation of process-independent attacks for industrial control systems
E Sarkar, H Benkraouda, M Maniatakos
Proceedings of the 15th ACM asia conference on computer and communications …, 2020
152020
Snifu: Secure network interception for firmware updates in legacy plcs
H Benkraouda, MA Chakkantakath, A Keliris, M Maniatakos
2020 IEEE 38th VLSI Test Symposium (VTS), 1-6, 2020
152020
Facehack: Attacking facial recognition systems using malicious facial characteristics
E Sarkar, H Benkraouda, G Krishnan, H Gamil, M Maniatakos
IEEE Transactions on Biometrics, Behavior, and Identity Science 4 (3), 361-372, 2021
132021
Everybody’s got ML, tell me what else you have: Practitioners’ perception of ML-based security tools and explanations
J Mink, H Benkraouda, L Yang, A Ciptadi, A Ahmadzadeh, D Votipka, ...
2023 IEEE Symposium on Security and Privacy (SP), 2068-2085, 2023
72023
Image reconstruction attacks on distributed machine learning models
H Benkraouda, K Nahrstedt
Proceedings of the 2nd ACM International Workshop on Distributed Machine …, 2021
72021
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks
C Wang, Z Jia, H Benkraouda, C Zevnik, N Heuermann, R Foulger, ...
Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-17, 2024
2024
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications
H Benkraouda, A Agrawal, D Tychalas, M Sazos, M Maniatakos
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 83-89, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–10