[ Publications of Vafa Andalibi ]
Conference publications (11) |
-
Jacob Abbott,
Jayati Dev,
DongInn Kim,
Shakthidhar Reddy Gopavaram,
Meera Iyer,
Shivani Sadam,
Shirang Mare,
Tatiana Ringenberg,
Vafa Andalibi,
and L. Jean Camp.
Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices.
In Proceedings of the Symposium on Usable Security and Privacy (USEC) 2023,
USEC '23,
San Diego, CA, USA,
2023.
Keywords: Security, user interviews, smart home, IoT. [bibtex-entry] -
Jacob Abbott,
Jayati Dev,
Donginn Kim,
Shakthidhar Gopavaram,
Meera Iyer,
Shivani Sadam,
Shrirang Mare,
Tatiana Ringenberg,
Vafa Andalibi,
and L. Jean Camp.
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home.
In Proceedings of the 2022 European Symposium on Usable Security,
EuroUSEC '22,
New York, NY, USA,
pages 98–110,
2022.
Association for Computing Machinery.
Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry] -
Vafa Andalibi,
Eliot Lear,
DongInn Kim,
and L Jean Camp.
On the analysis of MUD-files’ interactions, conflicts, and configuration requirements before deployment.
In The Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021,
pages 137--157,
2022.
Springer International Publishing.
Keywords: MUD. [bibtex-entry] -
Vafa Andalibi,
Erfan Sadeqi Azer,
and L Jean Camp.
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures.
In Proceedings of the 55th Hawaii International Conference on System Sciences,
2022.
Keywords: phishing, user studies, global resilience. [bibtex-entry] -
Vafa Andalibi,
Jayati Dev,
DongInn Kim,
Eliot Lear,
and Jean Camp.
Making Access Control Easy in IoT.
In IFIP International Symposium on Human Aspects of Information Security & Assurance,
June 2021.
Keywords: IoT, MUD, MUD-Visualizer. [bibtex-entry] -
Vafa Andalibi,
Eliot Lear,
DongInn Kim,
and Jean Camp.
On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment.
In 5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT,
May 2021.
Springer.
Keywords: IoT, MUD, MUD-Visualizer. [bibtex-entry] -
DongInn Kim,
Vafa Andalibi,
and L Jean Camp.
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things.
In SafeThings 2021,
Oakland,
May 2021.
IEEE Workshop on the Internet of Safe Things.
Keywords: Fingerprinting, IoT. [bibtex-entry] -
Vafa Andalibi,
Jayati Dev,
DongInn Kim,
Eliot Lear,
and L Jean Camp.
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD).
In Annual Computer Security Applications Conference,
pages 337--348,
2021.
Keywords: MUD, access control, IoT, user studies. [bibtex-entry] -
DongInn Kim,
Vafa Andalibi,
and L Jean Camp.
Fingerprinting Edge and Cloud Services in IoT.
In Systematic Approaches to Digital Forensic Engineering,
City University of New York (CUNY), New York City,
May 2020.
IEEE Computer Society.
Keywords: Fingerprinting, IoT. [bibtex-entry] -
Vafa Andalibi,
DongInn Kim,
and L. Jean Camp.
Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network.
In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19),
Renton, WA,
July 2019.
USENIX Association.
Keywords: MUD, IoT. [bibtex-entry] -
Vafa Andalibi,
Francois Christophe,
and Tommi Mikkonen.
Analysis of Paradoxes in Fingerprint Countermeasures.
In Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland,
2017.
FRUCT Oy.
Keywords: Browser Fingerprinting, End-User Privacy. [bibtex-entry]
Posters and Presentations (2) |
-
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys.
A Bsides MSP Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Securtle: The Security Turtle.
A Bsides STL Workshop,
September 2019.
Keywords: IoT. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House