Soteris Demetriou
Soteris Demetriou
Assistant Professor, Imperial College London
Vahvistettu sähköpostiosoite verkkotunnuksessa - Kotisivu
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
NDSS, 2015
Free for All! Assessing User Data Exposure to Advertising Libraries on Android.
S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter
NDSS, 2016
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
NDSS, 2014
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Draco: A system for uniform and fine-grained access control for web code on android
GS Tuncay, S Demetriou, CA Gunter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Discovering the invisible city: Location-based games for learning in smart cities.
C Sintoris, N Yiannoutsou, S Demetriou, NM Avouris
IxD&A 16, 47-64, 2013
Resolving the predicament of android custom permissions
GS Tuncay, S Demetriou, K Ganju, C Gunter
Internet Society, 2018
Camforensics: Understanding visual privacy leaks in the wild
A Srivastava, P Jain, S Demetriou, LP Cox, KH Kim
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017
CoDrive: Improving Automobile Positioning via Collaborative Driving
S Demetriou, P Jain, KH Kim
IEEE International Conference on Computer Communications, 2018
DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
F Mo, AS Shamsabadi, K Katevas, S Demetriou, I Leontiadis, A Cavallaro, ...
arXiv preprint arXiv:2004.05703, 2020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent 10,685,142, 2020
Determination of a next state of multiple IoT devices within an environment
S Demetriou, P Jain
US Patent 10,778,516, 2020
Discovering the invisible city: Game design for learning in technology enhanced places
C Sintoris, N Yiannoutsou, S Demetriou, N Avouris
ARV Workshop on Smart Cities Learning, Villalard-de-Lans, Vercors, 2013
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing
Z Hau, S Demetriou, L Muñoz-González, EC Lupu
arXiv preprint arXiv:2008.12008, 2020
Analyzing & designing the security of shared resources on smartphone operating systems
S Demetriou
University of Illinois at Urbana-Champaign, 2018
Android at risk: current threats stemming from unprotected local and external resources
S Demetriou
Layer-wise Characterization of Latent Information Leakage in Federated Learning
F Mo, A Borovykh, M Malekzadeh, H Haddadi, S Demetriou
arXiv preprint arXiv:2010.08762, 2020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20