Browse by Author or creator
Vaidya, Girish and Prabhakar, T.V. and Gnani, Nithish and Shah, Ryan and Nagaraja, Shishir (2023) Sensor identification via Acoustic Physically Unclonable Function (PUF). Digital Threats: Research and Practice, 4 (2). pp. 1-25. 20. ISSN 2692-1626
Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) The dangers of computational law and cybersecurity; perspectives from engineering and the AI Act. Other. arXiv.org, Ithaca, NY.
Ludvigsen, Kaspar Rosager and Nagaraja, Shishir and Daly, Angela (2022) YASM (Yet Another Surveillance Mechanism). Other. arXiv.org, Ithaca, NY.
Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) The opportunity to regulate cybersecurity in the EU (and the world) : recommendations for the Cybersecurity Resilience Act. Other. arXiv.org, Ithaca, NY.
Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir (2022) Can you still see me? Reconstructing robot operations over end-to-end encrypted channels. Other. arXiv.org, Ithaca, NY.
Shah, Ryan and Ahmed, Chuadhry Mujeeb and Nagaraja, Shishir; (2022) Can you still see me? Identifying robot operations over end-to-end encrypted channels. In: WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks . ACM, New York, pp. 298-300. ISBN 9781450392167
Rosager Ludvigsen, Kaspar and Nagaraja, Shishir (2022) Dissecting liabilities in adversarial surgical robot failures : a national (Danish) and EU law perspective. Computer Law and Security Review, 44. 105656. ISSN 0267-3649
Ludvigsen, Kaspar and Nagaraja, Shishir and Daly, Angela (2022) When is software a medical device? Understanding and determining the "intention" and requirements for software as a medical device in European union law. European Journal of Risk Regulation, 13 (1). pp. 78-93. ISSN 1867-299X
Gardiner, Joseph and Eiffert, Adam and Garraghan, Peter and Race, Nicholas and Nagaraja, Shishir and Rashid, Awais; (2021) Controller-in-the-middle : attacks on software defined networks in industrial control systems. In: CPSIoTSec 2021 - Proceedings of the 2nd Workshop on CPS and IoT Security and Privacy, co-located with CCS 2021. ACM, New York, NY., 63–68. ISBN 9781450384872
Nagaraja, Shishir and Shah, Ryan; (2021) VoIPLoc : passive VoIP call provenance via acoustic side-channels. In: WiSec '21. Association for Computing Machinery, ARE, pp. 323-334. ISBN 9781450383493
Shah, Ryan and Nagaraja, Shishir; Kanhere, Salil and Patil, Vishwas T and Sural, Shamik and Gaur, Manoj S, eds. (2020) A unified access control model for calibration traceability in safety-critical IoT. In: Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer, IND, pp. 3-22. ISBN 9783030656096
Nagaraja, Shishir (2020) Unlinking super-linkers : the topology of epidemic response (Covid-19). Preprint / Working Paper. arXiv.org.
Shah, Ryan and McIntee, Michael and Nagaraja, Shishir and Bhandary, Sahil and Arote, Prerna and Kuri, Joy (2019) Secure calibration in high-assurance IoT : traceability for safety resilience. Preprint / Working Paper. arXiv.org, Ithica, N.Y..
Nagaraja, Shishir and Shah, Ryan (2019) VoipLoc : VoIP call provenance using acoustic side-channels. In: IEEE Security and Privacy 2020, 2020-05-18 - 2020-05-20.
Shah, Ryan and Nagaraja, Shishir (2019) A game-theoretic analysis of DoS attacks on driverless vehicles. Preprint / Working Paper. arXiv.org, Ithica, N.Y..
Shah, Ryan and Nagaraja, Shishir (2019) Privacy with surgical robotics : challenges in applying contextual privacy theory. In: 2nd annual Symposium on Applications of Contextual Integrity, 2019-08-19 - 2019-08-20. (In Press)
Shah, Ryan and Nagaraja, Shishir; (2019) Poster : Unified access control for surgical robotics. In: SACMAT '19, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM, CAN, pp. 231-233. ISBN 9781450367530
Shah, Ryan and Nagaraja, Shishir (2019) An access control model for robot calibration. Preprint / Working Paper. arXiv.org, Ithica, N.Y..
Nagaraja, Shishir and Shah, Ryan; (2019) Clicktok : click fraud detection using traffic analysis. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. ACM, New York, NY., pp. 105-116. ISBN 9781450367264
Shah, Ryan and Nagaraja, Shishir; (2019) Do we have the time for IRM? : Service denial attacks and SDN-based defences. In: ICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking. Association for Computing Machinery, IND, pp. 496-501. ISBN 9781450360944
Biswas, Arnab Kumar and Ghosal, Dipak and Nagaraja, Shishir (2017) A survey of timing channels and countermeasures. ACM Computing Surveys, 50 (1). 6. ISSN 1557-7341
Gardiner, Joseph and Nagaraja, Shishir (2016) On the security of machine learning in malware C&C detection : a survey. ACM Computing Surveys, 49 (3). 59. ISSN 1557-7341
Gardiner, Joseph and Nagaraja, Shishir (2014) Blindspot : indistinguishable anonymous communications. Preprint / Working Paper. arXiv.org, Ithaca, N.Y..
Nagaraja, Shishir and Anderson, Ross (2006) The topology of covert conflict. In: 5th Annual Workshop on the Economics of Information Security, 2006-06-26 - 2006-06-28.