Traceability in supply chains: A Cyber security analysis

NF Syed, SW Shah, R Trujillo-Rasua, R Doss - Computers & Security, 2022 - Elsevier
Digital technologies are increasingly being adopted in modern supply chains for product
traceability, enabling data sharing amongst trading partners, quick availability of product …

Edible unclonable functions

JW Leem, MS Kim, SH Choi, SR Kim, SW Kim… - Nature …, 2020 - nature.com
Counterfeit medicines are a fundamental security problem. Counterfeiting medication poses
a tremendous threat to patient safety, public health, and the economy in developed and less …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019 - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

Usable security for QR code

R Focardi, FL Luccio, HAM Wahsheh - Journal of Information Security and …, 2019 - Elsevier
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …

Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations

A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …

Surveylance: Automatically detecting online survey scams

A Kharraz, W Robertson, E Kirda - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Online surveys are a popular mechanism for performing market research in exchange for
monetary compensation. Unfortunately, fraudulent survey websites are similarly rising in …

Critical risk considerations in auto-ID security: Barcode vs. RFID

YJ Tu, W Zhou, S Piramuthu - Decision Support Systems, 2021 - Elsevier
Automated identification (auto-ID) has been widely used in practice for more than five
decades, beginning with the commercial use of barcodes in the early 1970s. More recently …

Phishing with malicious QR codes

F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …

Authenticating video feeds using electric network frequency estimation at the edge

D Nagothu, Y Chen, A Aved… - … Endorsed Transactions on …, 2021 - publications.eai.eu
Abstract Large scale Internet of Video Things (IoVT) supports situation awareness for smart
cities; however, the rapid development in artificial intelligence (AI) technologies enables …

Lightanchors: Appropriating point lights for spatially-anchored augmented reality interfaces

K Ahuja, S Pareddy, R Xiao, M Goel… - Proceedings of the 32nd …, 2019 - dl.acm.org
Augmented reality requires precise and instant overlay of digital information onto everyday
objects. We present our work on LightAnchors, a new method for displaying spatially …