Giuseppe Petracca
Giuseppe Petracca
Verified email at - Homepage
Cited by
Cited by
A survey on sensor-based threats to internet-of-things (iot) devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
arXiv preprint arXiv:1802.02041, 2018
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Adaptive data protection in distributed systems
AC Squicciarini, G Petracca, E Bertino
Proceedings of the third ACM conference on Data and application security and …, 2013
Aware: Preventing abuse of privacy-sensitive sensors via operation bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th {USENIX} Security Symposium ({USENIX} Security 17), 379-396, 2017
{PARTEMU}: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
29th {USENIX} Security Symposium ({USENIX} Security 20), 789-806, 2020
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
Pileus: Protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Inevitable failure: The flawed trust assumption in the cloud
Y Sun, G Petracca, T Jaeger
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
On risk in access control enforcement
G Petracca, F Capobianco, C Skalka, T Jaeger
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
Situational awareness through reasoning on network incidents
AC Squicciarini, G Petracca, WG Horne, A Nath
Proceedings of the 4th ACM conference on Data and application security and …, 2014
Agility maneuvers to mitigate inference attacks on sensed location data
G Petracca, LM Marvel, A Swami, T Jaeger
MILCOM 2016-2016 IEEE Military Communications Conference, 259-264, 2016
Aware: Controlling App Access to I/O Devices on Mobile Platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
Adaptive data management for self-protecting objects in cloud computing systems
AC Squicciarini, G Petracca, E Bertino
2012 8th international conference on network and service management (cnsm …, 2012
Early detection of policies violations in a social media site: A bayesian belief network approach
AC Squicciarini, W Mcgill, G Petracca, S Huang
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
Enabling secure and usable mobile application: revealing the nuts and bolts of software TPM in todays mobile devices
AA Reineh, G Petracca, J Uusilehto, A Martin
arXiv preprint arXiv:1606.02995, 2016
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
A Atamli, G Petracca, J Crowcroft
Proceedings of the 14th International Conference on Availability …, 2019
EnTrust: Regulating sensor access by cooperating programs via delegation graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th {USENIX} Security Symposium ({USENIX} Security 19), 567-584, 2019
A Survey on Sensor-based Threats and Attacks to Smart Devices and Applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
IEEE Communications Surveys & Tutorials, 2021
The system can't perform the operation now. Try again later.
Articles 1–20