Bluetooth low energy in dense IoT environments AF Harris III, V Khanna, G Tuncay, R Want, R Kravets IEEE Communications Magazine 54 (12), 30-36, 2016 | 94 | 2016 |
Resolving the predicament of android custom permissions GS Tuncay, S Demetriou, K Ganju, C Gunter Internet Society, 2018 | 58 | 2018 |
Autonomous and distributed recruitment and data collection framework for opportunistic sensing GS Tuncay, G Benincasa, A Helmy Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 57 | 2012 |
Draco: A system for uniform and fine-grained access control for web code on android GS Tuncay, S Demetriou, CA Gunter Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 56 | 2016 |
Participant recruitment and data collection framework for opportunistic sensing: a comparative analysis GS Tuncay, G Benincasa, A Helmy Proceedings of the 8th ACM MobiCom workshop on Challenged networks, 25-30, 2013 | 36 | 2013 |
See no evil: phishing for permissions with false transparency GS Tuncay, J Qian, CA Gunter 29th USENIX Security Symposium (USENIX Security 20), 415-432, 2020 | 24 | 2020 |
For your eyes only R Kravets, GS Tuncay, H Sundaram Proceedings of the 6th International Workshop on Mobile Cloud Computing and …, 2015 | 17 | 2015 |
Smart LaBLEs: Proximity, Autoconfiguration, and a constant supply of gatorade (TM) AF Harris, V Khanna, GS Tuncay, RH Kravets 2016 IEEE/ACM Symposium on Edge Computing (SEC), 142-154, 2016 | 8 | 2016 |
{RøB}: Ransomware over Modern Web Browsers H Oz, A Aris, A Acar, GS Tuncay, L Babun, S Uluagac 32nd USENIX Security Symposium (USENIX Security 23), 7073-7090, 2023 | 6 | 2023 |
Smartphone security behavioral scale: a new psychometric measurement for smartphone security HY Huang, S Demetriou, R Banerjee, GS Tuncay, CA Gunter, M Bashir arXiv preprint arXiv:2007.01721, 2020 | 5* | 2020 |
50 Shades of Support: A Device-Centric Analysis of Android Security Updates A Acar, GS Tuncay, E Luques, H Oz, A Aris, S Uluagac Network and Distributed System Security (NDSS) Symposium 2024, 2024 | 4 | 2024 |
Poster: Feasibility of malware visualization techniques against adversarial machine learning attacks H Oz, F Naseem, A Aris, A Acar, GS Tuncay, AS Uluagac 43rd IEEE Symposium on Security and Privacy (S&P), 2022 | 4 | 2022 |
Savealert: Design for a sensor-driven crowdwatch danger detection system GS Tuncay, K Varshavskiy, R Kravets Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 4 | 2014 |
Wear’s my Data? Understanding the Cross-Device Runtime Permission Model in Wearables D Yeke, M Ibrahim, GS Tuncay, H Farrukh, A Imran, A Bianchi, ZB Celik 2024 IEEE Symposium on Security and Privacy (SP), 77-77, 2023 | 2 | 2023 |
The Android Platform Security Model (2023) R Mayrhofer, J Vander Stoep, C Brubaker, D Hackborn, B Bonné, ... arXiv preprint arXiv:1904.05572, 2023 | 2 | 2023 |
Evaluating user behavior in smartphone security: a psychometric perspective HY Huang, S Demetriou, M Hassan, GS Tuncay, CA Gunter, M Bashir Nineteenth Symposium on Usable Privacy and Security (USENIX SOUPS 2023), 509-524, 2023 | 1 | 2023 |
Practical least privilege for cross-origin interactions on mobile operating systems GS Tuncay University of Illinois at Urbana-Champaign, 2019 | 1 | 2019 |
(In) Security of File Uploads in Node.js H Oz, A Acar, A Aris, GS Tuncay, A Kharraz, S Uluagac Proceedings of the ACM on Web Conference 2024, 1573-1584, 2024 | | 2024 |
On the Robustness of Image-Based Malware Detection Against Adversarial Attacks Y Mekdad, F Naseem, A Aris, H Oz, A Acar, L Babun, S Uluagac, ... Network Security Empowered by Artificial Intelligence, 355-375, 2024 | | 2024 |
Poster: SaveAlert: an efficient and scalable sensor-driven danger detection system GS Tuncay, K Varshavskiy, RH Kravets, K Nahrstedt Proceedings of the 20th annual international conference on Mobile computing …, 2014 | | 2014 |