Traceability in supply chains: A Cyber security analysis
Digital technologies are increasingly being adopted in modern supply chains for product
traceability, enabling data sharing amongst trading partners, quick availability of product …
traceability, enabling data sharing amongst trading partners, quick availability of product …
Edible unclonable functions
Counterfeit medicines are a fundamental security problem. Counterfeiting medication poses
a tremendous threat to patient safety, public health, and the economy in developed and less …
a tremendous threat to patient safety, public health, and the economy in developed and less …
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
Usable security for QR code
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …
Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations
A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …
and indispensable for many organizations, businesses, and users. Their main purpose is to …
Surveylance: Automatically detecting online survey scams
Online surveys are a popular mechanism for performing market research in exchange for
monetary compensation. Unfortunately, fraudulent survey websites are similarly rising in …
monetary compensation. Unfortunately, fraudulent survey websites are similarly rising in …
Critical risk considerations in auto-ID security: Barcode vs. RFID
Automated identification (auto-ID) has been widely used in practice for more than five
decades, beginning with the commercial use of barcodes in the early 1970s. More recently …
decades, beginning with the commercial use of barcodes in the early 1970s. More recently …
Phishing with malicious QR codes
F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …
That changed overnight, as the QR codes became a convenient go-between for sharing …
Authenticating video feeds using electric network frequency estimation at the edge
Abstract Large scale Internet of Video Things (IoVT) supports situation awareness for smart
cities; however, the rapid development in artificial intelligence (AI) technologies enables …
cities; however, the rapid development in artificial intelligence (AI) technologies enables …
Lightanchors: Appropriating point lights for spatially-anchored augmented reality interfaces
Augmented reality requires precise and instant overlay of digital information onto everyday
objects. We present our work on LightAnchors, a new method for displaying spatially …
objects. We present our work on LightAnchors, a new method for displaying spatially …