BibTeX records: Kevin Fu

download as .bib file

@article{DBLP:journals/corr/abs-2401-13127,
  author       = {Pierce Howell and
                  Max Rudolph and
                  Reza Torbati and
                  Kevin Fu and
                  Harish Ravichandar},
  title        = {Generalization of Heterogeneous Multi-Robot Policies via Awareness
                  and Communication of Capabilities},
  journal      = {CoRR},
  volume       = {abs/2401.13127},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.13127},
  doi          = {10.48550/ARXIV.2401.13127},
  eprinttype    = {arXiv},
  eprint       = {2401.13127},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-13127.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/corl/HowellRTFR23,
  author       = {Pierce Howell and
                  Max Rudolph and
                  Reza Joseph Torbati and
                  Kevin Fu and
                  Harish Ravichandar},
  editor       = {Jie Tan and
                  Marc Toussaint and
                  Kourosh Darvish},
  title        = {Generalization of Heterogeneous Multi-Robot Policies via Awareness
                  and Communication of Capabilities},
  booktitle    = {Conference on Robot Learning, CoRL 2023, 6-9 November 2023, Atlanta,
                  GA, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {229},
  pages        = {2772--2790},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v229/howell23a.html},
  timestamp    = {Tue, 20 Feb 2024 12:11:46 +0100},
  biburl       = {https://dblp.org/rec/conf/corl/HowellRTFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23,
  author       = {Eric Gustafson and
                  Paul Grosen and
                  Nilo Redini and
                  Saagar Jha and
                  Andrea Continella and
                  Ruoyu Wang and
                  Kevin Fu and
                  Sara Rampazzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware
                  Images},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {32--45},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607217},
  doi          = {10.1145/3607199.3607217},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoltonL0HF23,
  author       = {Connor Bolton and
                  Yan Long and
                  Jun Han and
                  Josiah D. Hester and
                  Kevin Fu},
  title        = {Characterizing and Mitigating Touchtone Eavesdropping in Smartphone
                  Motion Sensors},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {164--178},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607203},
  doi          = {10.1145/3607199.3607203},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoltonL0HF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LongNKBRF23,
  author       = {Yan Long and
                  Pirouz Naghavi and
                  Blas Kojusner and
                  Kevin R. B. Butler and
                  Sara Rampazzi and
                  Kevin Fu},
  title        = {Side Eye: Characterizing the Limits of {POV} Acoustic Eavesdropping
                  from Smartphone Cameras with Rolling Shutters and Movable Lenses},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1857--1874},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179313},
  doi          = {10.1109/SP46215.2023.10179313},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LongNKBRF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LongYXPXF23,
  author       = {Yan Long and
                  Chen Yan and
                  Shilin Xiao and
                  Shivan Prasad and
                  Wenyuan Xu and
                  Kevin Fu},
  title        = {Private Eye: On the Limits of Textual Screen Peeking via Eyeglass
                  Reflections in Video Conferencing},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3432--3449},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179423},
  doi          = {10.1109/SP46215.2023.10179423},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LongYXPXF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spacesec/CyrL0F23,
  author       = {Benjamin Cyr and
                  Yan Long and
                  Takeshi Sugawara and
                  Kevin Fu},
  title        = {Position Paper: Space System Threat Models Must Account for Satellite
                  Sensor Spoofing},
  booktitle    = {1st Workshop on Security of Space and Satellite Systems, SpaceSec
                  2023, San Diego, California, USA, Feburary, 27, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://doi.org/10.14722/spacesec.2023.231491},
  doi          = {10.14722/SPACESEC.2023.231491},
  timestamp    = {Tue, 19 Dec 2023 16:39:16 +0100},
  biburl       = {https://dblp.org/rec/conf/spacesec/CyrL0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-10056,
  author       = {Yan Long and
                  Pirouz Naghavi and
                  Blas Kojusner and
                  Kevin R. B. Butler and
                  Sara Rampazzi and
                  Kevin Fu},
  title        = {Side Eye: Characterizing the Limits of {POV} Acoustic Eavesdropping
                  from Smartphone Cameras with Rolling Shutters and Movable Lenses},
  journal      = {CoRR},
  volume       = {abs/2301.10056},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.10056},
  doi          = {10.48550/ARXIV.2301.10056},
  eprinttype    = {arXiv},
  eprint       = {2301.10056},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-10056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11745,
  author       = {Yan Long and
                  Kevin Fu},
  title        = {Side Auth: Synthesizing Virtual Sensors for Authentication},
  journal      = {CoRR},
  volume       = {abs/2301.11745},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11745},
  doi          = {10.48550/ARXIV.2301.11745},
  eprinttype    = {arXiv},
  eprint       = {2301.11745},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11745.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/LongCRHF22,
  author       = {Yan Long and
                  Alexander Curtiss and
                  Sara Rampazzi and
                  Josiah D. Hester and
                  Kevin Fu},
  title        = {VeriMask: Sensor Platform for Decontamination of {N95} Masks},
  journal      = {GetMobile Mob. Comput. Commun.},
  volume       = {26},
  number       = {2},
  pages        = {25--28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551670.3551679},
  doi          = {10.1145/3551670.3551679},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/LongCRHF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YamashitaCFBS22,
  author       = {Kohei Yamashita and
                  Benjamin Cyr and
                  Kevin Fu and
                  Wayne P. Burleson and
                  Takeshi Sugawara},
  title        = {Redshift: Manipulating Signal Propagation Delay via Continuous-Wave
                  Lasers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {463--489},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.463-489},
  doi          = {10.46586/TCHES.V2022.I4.463-489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YamashitaCFBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LongF22,
  author       = {Yan Long and
                  Kevin Fu},
  title        = {Side Auth: Synthesizing Virtual Sensors for Authentication},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584321},
  doi          = {10.1145/3584318.3584321},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LongF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-03971,
  author       = {Yan Long and
                  Chen Yan and
                  Shivan Prasad and
                  Wenyuan Xu and
                  Kevin Fu},
  title        = {Private Eye: On the Limits of Textual Screen Peeking via Eyeglass
                  Reflections in Video Conferencing},
  journal      = {CoRR},
  volume       = {abs/2205.03971},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.03971},
  doi          = {10.48550/ARXIV.2205.03971},
  eprinttype    = {arXiv},
  eprint       = {2205.03971},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-03971.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/LongCRHF21,
  author       = {Yan Long and
                  Alexander Curtiss and
                  Sara Rampazzi and
                  Josiah D. Hester and
                  Kevin Fu},
  title        = {VeriMask: Facilitating Decontamination of {N95} Masks in the {COVID-19}
                  Pandemic: Challenges, Lessons Learned, and Safeguarding the Future},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {5},
  number       = {3},
  pages        = {119:1--119:29},
  year         = {2021},
  url          = {https://doi.org/10.1145/3478105},
  doi          = {10.1145/3478105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/LongCRHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeesensors/Cyr0F21,
  author       = {Benjamin Cyr and
                  Takeshi Sugawara and
                  Kevin Fu},
  title        = {Why Lasers Inject Perceived Sound Into {MEMS} Microphones: Indications
                  and Contraindications of Photoacoustic and Photoelectric Effects},
  booktitle    = {2021 {IEEE} Sensors, Sydney, Australia, October 31 - Nov. 3, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SENSORS47087.2021.9639744},
  doi          = {10.1109/SENSORS47087.2021.9639744},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeesensors/Cyr0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JiCZWYXF21,
  author       = {Xiaoyu Ji and
                  Yushi Cheng and
                  Yuepeng Zhang and
                  Kai Wang and
                  Chen Yan and
                  Wenyuan Xu and
                  Kevin Fu},
  title        = {Poltergeist: Acoustic Adversarial Machine Learning against Cameras
                  and Computer Vision},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {160--175},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00091},
  doi          = {10.1109/SP40001.2021.00091},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JiCZWYXF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-13834,
  author       = {Connor Bolton and
                  Yan Long and
                  Jun Han and
                  Josiah D. Hester and
                  Kevin Fu},
  title        = {Touchtone leakage attacks via smartphone sensors: mitigation without
                  hardware modification},
  journal      = {CoRR},
  volume       = {abs/2109.13834},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.13834},
  eprinttype    = {arXiv},
  eprint       = {2109.13834},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-13834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BoltonFHH20,
  author       = {Connor Bolton and
                  Kevin Fu and
                  Josiah D. Hester and
                  Jun Han},
  title        = {How to curtail oversensing in the home},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {6},
  pages        = {20--24},
  year         = {2020},
  url          = {https://doi.org/10.1145/3396261},
  doi          = {10.1145/3396261},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BoltonFHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/LongCRHF20,
  author       = {Yan Long and
                  Alexander Curtiss and
                  Sara Rampazzi and
                  Josiah D. Hester and
                  Kevin Fu},
  editor       = {Jin Nakazawa and
                  Polly Huang},
  title        = {Automating decontamination of {N95} masks for frontline workers in
                  {COVID-19} pandemic: poster abstract},
  booktitle    = {SenSys '20: The 18th {ACM} Conference on Embedded Networked Sensor
                  Systems, Virtual Event, Japan, November 16-19, 2020},
  pages        = {747--749},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384419.3430613},
  doi          = {10.1145/3384419.3430613},
  timestamp    = {Wed, 04 May 2022 13:03:25 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/LongCRHF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YanSBXKF20,
  author       = {Chen Yan and
                  Hocheol Shin and
                  Connor Bolton and
                  Wenyuan Xu and
                  Yongdae Kim and
                  Kevin Fu},
  title        = {SoK: {A} Minimalist Approach to Formalizing Analog Sensor Security},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {233--248},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00026},
  doi          = {10.1109/SP40000.2020.00026},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YanSBXKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SugawaraCRGF20,
  author       = {Takeshi Sugawara and
                  Benjamin Cyr and
                  Sara Rampazzi and
                  Daniel Genkin and
                  Kevin Fu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
                  Systems},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2631--2648},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/sugawara},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SugawaraCRGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06585,
  author       = {Wayne P. Burleson and
                  Kevin Fu and
                  Denise L. Anthony and
                  Jorge Guajardo and
                  Carl A. Gunter and
                  Kyle Ingols and
                  Jean{-}Baptiste Jeannin and
                  Farinaz Koushanfar and
                  Carl E. Landwehr and
                  Susan Squires},
  title        = {Grand Challenges for Embedded Security Research in a Connected World},
  journal      = {CoRR},
  volume       = {abs/2005.06585},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06585},
  eprinttype    = {arXiv},
  eprint       = {2005.06585},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06585.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-11946,
  author       = {Takeshi Sugawara and
                  Benjamin Cyr and
                  Sara Rampazzi and
                  Daniel Genkin and
                  Kevin Fu},
  title        = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2006.11946},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.11946},
  eprinttype    = {arXiv},
  eprint       = {2006.11946},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00017,
  author       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Daniel Lopresti and
                  Elizabeth D. Mynatt and
                  Klara Nahrstedt and
                  Shwetak N. Patel and
                  Debra J. Richardson and
                  Benjamin G. Zorn},
  title        = {Safety, Security, and Privacy Threats Posed by Accelerating Trends
                  in the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2008.00017},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00017},
  eprinttype    = {arXiv},
  eprint       = {2008.00017},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/YanFX19,
  author       = {Chen Yan and
                  Kevin Fu and
                  Wenyuan Xu},
  title        = {On Cuba, diplomats, ultrasound, and intermodulation distortion},
  journal      = {Comput. Biol. Medicine},
  volume       = {104},
  pages        = {250--266},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compbiomed.2018.11.012},
  doi          = {10.1016/J.COMPBIOMED.2018.11.012},
  timestamp    = {Sun, 28 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/YanFX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoXCZPRCFM19,
  author       = {Yulong Cao and
                  Chaowei Xiao and
                  Benjamin Cyr and
                  Yimeng Zhou and
                  Won Park and
                  Sara Rampazzi and
                  Qi Alfred Chen and
                  Kevin Fu and
                  Z. Morley Mao},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Adversarial Sensor Attack on LiDAR-based Perception in Autonomous
                  Driving},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2267--2281},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339815},
  doi          = {10.1145/3319535.3339815},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoXCZPRCFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TuRHRFH19,
  author       = {Yazhou Tu and
                  Sara Rampazzi and
                  Bin Hao and
                  Angel Rodriguez and
                  Kevin Fu and
                  Xiali Hei},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Trick or Heat?: Manipulating Critical Temperature-Based Control Systems
                  Using Rectification Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2301--2315},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354195},
  doi          = {10.1145/3319535.3354195},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TuRHRFH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KwongXF19,
  author       = {Andrew Kwong and
                  Wenyuan Xu and
                  Kevin Fu},
  title        = {Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {905--919},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00008},
  doi          = {10.1109/SP.2019.00008},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KwongXF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-07110,
  author       = {Yazhou Tu and
                  Sara Rampazzi and
                  Bin Hao and
                  Angel Rodriguez and
                  Kevin Fu and
                  Xiali Hei},
  title        = {Trick or Heat? Attack on Amplification Circuits to Abuse Critical
                  Temperature Control Systems},
  journal      = {CoRR},
  volume       = {abs/1904.07110},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.07110},
  eprinttype    = {arXiv},
  eprint       = {1904.07110},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-07110.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-06826,
  author       = {Yulong Cao and
                  Chaowei Xiao and
                  Benjamin Cyr and
                  Yimeng Zhou and
                  Won Park and
                  Sara Rampazzi and
                  Qi Alfred Chen and
                  Kevin Fu and
                  Z. Morley Mao},
  title        = {Adversarial Sensor Attack on LiDAR-based Perception in Autonomous
                  Driving},
  journal      = {CoRR},
  volume       = {abs/1907.06826},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.06826},
  eprinttype    = {arXiv},
  eprint       = {1907.06826},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-06826.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/FuX18,
  author       = {Kevin Fu and
                  Wenyuan Xu},
  title        = {Risks of trusting the physics of sensors},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {2},
  pages        = {20--23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176402},
  doi          = {10.1145/3176402},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/FuX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BoltonRLKXF18,
  author       = {Connor Bolton and
                  Sara Rampazzi and
                  Chaohao Li and
                  Andrew Kwong and
                  Wenyuan Xu and
                  Kevin Fu},
  title        = {Blue Note: How Intentional Acoustic Interference Damages Availability
                  and Integrity in Hard Disk Drives and Operating Systems},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {1048--1062},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00050},
  doi          = {10.1109/SP.2018.00050},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BoltonRLKXF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TrippelWXHF17,
  author       = {Timothy Trippel and
                  Ofir Weisse and
                  Wenyuan Xu and
                  Peter Honeyman and
                  Kevin Fu},
  title        = {{WALNUT:} Waging Doubt on the Integrity of {MEMS} Accelerometers with
                  Acoustic Injection Attacks},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {3--18},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.42},
  doi          = {10.1109/EUROSP.2017.42},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/TrippelWXHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FuDMMPPZ17,
  author       = {Kevin Fu and
                  Ann W. Drobnis and
                  Greg Morrisett and
                  Elizabeth D. Mynatt and
                  Shwetak N. Patel and
                  Radha Poovendran and
                  Benjamin G. Zorn},
  title        = {Safety and Security for Intelligent Infrastructure},
  journal      = {CoRR},
  volume       = {abs/1705.02002},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.02002},
  eprinttype    = {arXiv},
  eprint       = {1705.02002},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FuDMMPPZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/HesterTRSHFBS16,
  author       = {Josiah D. Hester and
                  Nicole Tobias and
                  Amir Rahmati and
                  Lanny Sitanayah and
                  Daniel E. Holcomb and
                  Kevin Fu and
                  Wayne P. Burleson and
                  Jacob Sorber},
  title        = {Persistent Clocks for Batteryless Sensing Devices},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {77:1--77:28},
  year         = {2016},
  url          = {https://doi.org/10.1145/2903140},
  doi          = {10.1145/2903140},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/HesterTRSHFBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/Fu16,
  author       = {Kevin Fu},
  editor       = {Ayse K. Coskun and
                  Martin Margala and
                  Laleh Behjat and
                  Jie Han},
  title        = {Medical Device Security: The First 165 Years},
  booktitle    = {Proceedings of the 26th edition on Great Lakes Symposium on VLSI,
                  {GLVLSI} 2016, Boston, MA, USA, May 18-20, 2016},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2902961.2902964},
  doi          = {10.1145/2902961.2902964},
  timestamp    = {Wed, 10 Mar 2021 14:55:38 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/Fu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlurBDFFHLNMPRS16,
  author       = {Rajeev Alur and
                  Emery D. Berger and
                  Ann W. Drobnis and
                  Limor Fix and
                  Kevin Fu and
                  Gregory D. Hager and
                  Daniel P. Lopresti and
                  Klara Nahrstedt and
                  Elizabeth D. Mynatt and
                  Shwetak N. Patel and
                  Jennifer Rexford and
                  John A. Stankovic and
                  Benjamin G. Zorn},
  title        = {Systems Computing Challenges in the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1604.02980},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.02980},
  eprinttype    = {arXiv},
  eprint       = {1604.02980},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlurBDFFHLNMPRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KotzFGR15,
  author       = {David Kotz and
                  Kevin Fu and
                  Carl A. Gunter and
                  Aviel D. Rubin},
  title        = {Security for mobile and cloud frontiers in healthcare},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {8},
  pages        = {21--23},
  year         = {2015},
  url          = {https://doi.org/10.1145/2790830},
  doi          = {10.1145/2790830},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KotzFGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/XuRHFB15,
  author       = {Xiaolin Xu and
                  Amir Rahmati and
                  Daniel E. Holcomb and
                  Kevin Fu and
                  Wayne P. Burleson},
  title        = {Reliable Physical Unclonable Functions Using Data Retention Voltage
                  of {SRAM} Cells},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {6},
  pages        = {903--914},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2418288},
  doi          = {10.1109/TCAD.2015.2418288},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/XuRHFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/RahmatiHHF15,
  author       = {Amir Rahmati and
                  Matthew Hicks and
                  Daniel E. Holcomb and
                  Kevin Fu},
  editor       = {Deborah T. Marr and
                  David H. Albonesi},
  title        = {Probable cause: the deanonymizing effects of approximate {DRAM}},
  booktitle    = {Proceedings of the 42nd Annual International Symposium on Computer
                  Architecture, Portland, OR, USA, June 13-17, 2015},
  pages        = {604--615},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2749469.2750419},
  doi          = {10.1145/2749469.2750419},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/RahmatiHHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/LeeHKRWWRPSSBDFGTJJKMPMR14,
  author       = {Edward A. Lee and
                  Bj{\"{o}}rn Hartmann and
                  John Kubiatowicz and
                  Tajana Simunic Rosing and
                  John Wawrzynek and
                  David Wessel and
                  Jan M. Rabaey and
                  Kris Pister and
                  Alberto L. Sangiovanni{-}Vincentelli and
                  Sanjit A. Seshia and
                  David T. Blaauw and
                  Prabal Dutta and
                  Kevin Fu and
                  Carlos Guestrin and
                  Ben Taskar and
                  Roozbeh Jafari and
                  Douglas L. Jones and
                  Vijay Kumar and
                  Rahul Mangharam and
                  George J. Pappas and
                  Richard M. Murray and
                  Anthony Rowe},
  title        = {The Swarm at the Edge of the Cloud},
  journal      = {{IEEE} Des. Test},
  volume       = {31},
  number       = {3},
  pages        = {8--20},
  year         = {2014},
  url          = {https://doi.org/10.1109/MDAT.2014.2314600},
  doi          = {10.1109/MDAT.2014.2314600},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/LeeHKRWWRPSSBDFGTJJKMPMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HolcombF14,
  author       = {Daniel E. Holcomb and
                  Kevin Fu},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Bitline {PUF:} Building Native Challenge-Response {PUF} Capability
                  into Any {SRAM}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {510--526},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_28},
  doi          = {10.1007/978-3-662-44709-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HolcombF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolcombF14,
  author       = {Daniel E. Holcomb and
                  Kevin Fu},
  title        = {Bitline {PUF:} Building Native Challenge-Response {PUF} Capability
                  into Any {SRAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/749},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HolcombF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/FuB13,
  author       = {Kevin Fu and
                  James Blum},
  title        = {Controlling for cybersecurity risks of medical device software},
  journal      = {Commun. {ACM}},
  volume       = {56},
  number       = {10},
  pages        = {35--37},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508701},
  doi          = {10.1145/2508701},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/FuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/SalajeghehWJLF13,
  author       = {Mastooreh Salajegheh and
                  Yue Wang and
                  Anxiao Jiang and
                  Erik G. Learned{-}Miller and
                  Kevin Fu},
  title        = {Half-Wits: Software Techniques for Low-Voltage Probabilistic Storage
                  on Microcontrollers with {NOR} Flash Memory},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {12},
  number       = {2s},
  pages        = {91:1--91:25},
  year         = {2013},
  url          = {https://doi.org/10.1145/2465787.2465793},
  doi          = {10.1145/2465787.2465793},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/SalajeghehWJLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ClarkMRSFX13,
  author       = {Shane S. Clark and
                  Hossen Asiful Mustafa and
                  Benjamin Ransford and
                  Jacob Sorber and
                  Kevin Fu and
                  Wenyuan Xu},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Current Events: Identifying Webpages by Tapping the Electrical Outlet},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {700--717},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_39},
  doi          = {10.1007/978-3-642-40203-6\_39},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ClarkMRSFX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KuneBCKRFKX13,
  author       = {Denis Foo Kune and
                  John D. Backes and
                  Shane S. Clark and
                  Daniel B. Kramer and
                  Matthew R. Reynolds and
                  Kevin Fu and
                  Yongdae Kim and
                  Wenyuan Xu},
  title        = {Ghost Talk: Mitigating {EMI} Signal Injection Attacks against Analog
                  Sensors},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {145--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.20},
  doi          = {10.1109/SP.2013.20},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KuneBCKRFKX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClarkRRGSXF13,
  author       = {Shane S. Clark and
                  Benjamin Ransford and
                  Amir Rahmati and
                  Shane Guineau and
                  Jacob Sorber and
                  Wenyuan Xu and
                  Kevin Fu},
  editor       = {Kevin Fu and
                  Darren Lacey and
                  Zachary N. J. Peterson},
  title        = {WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted
                  Malware on Embedded Medical Devices},
  booktitle    = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech
                  '13, Washington, DC, USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ClarkRRGSXF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013healthtech,
  editor       = {Kevin Fu and
                  Darren Lacey and
                  Zachary N. J. Peterson},
  title        = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech
                  '13, Washington, DC, USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/healthtech13},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2013healthtech.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BurlesonCRF12,
  author       = {Wayne P. Burleson and
                  Shane S. Clark and
                  Benjamin Ransford and
                  Kevin Fu},
  editor       = {Patrick Groeneveld and
                  Donatella Sciuto and
                  Soha Hassoun},
  title        = {Design challenges for secure implantable medical devices},
  booktitle    = {The 49th Annual Design Automation Conference 2012, {DAC} '12, San
                  Francisco, CA, USA, June 3-7, 2012},
  pages        = {12--17},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2228360.2228364},
  doi          = {10.1145/2228360.2228364},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/BurlesonCRF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Molina-MarkhamDFSI12,
  author       = {Andres Molina{-}Markham and
                  George Danezis and
                  Kevin Fu and
                  Prashant J. Shenoy and
                  David E. Irwin},
  editor       = {Angelos D. Keromytis},
  title        = {Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_18},
  doi          = {10.1007/978-3-642-32946-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Molina-MarkhamDFSI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HolcombRSBF12,
  author       = {Daniel E. Holcomb and
                  Amir Rahmati and
                  Mastooreh Salajegheh and
                  Wayne P. Burleson and
                  Kevin Fu},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {DRV-Fingerprinting: Using Data Retention Voltage of {SRAM} Cells for
                  Chip Identification},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_12},
  doi          = {10.1007/978-3-642-36140-1\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HolcombRSBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClarkRF12,
  author       = {Shane S. Clark and
                  Benjamin Ransford and
                  Kevin Fu},
  editor       = {Patrick Traynor},
  title        = {Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional
                  Computing},
  booktitle    = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/clark},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ClarkRF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RahmatiSHSBF12,
  author       = {Amir Rahmati and
                  Mastooreh Salajegheh and
                  Daniel E. Holcomb and
                  Jacob Sorber and
                  Wayne P. Burleson and
                  Kevin Fu},
  editor       = {Tadayoshi Kohno},
  title        = {{TARDIS:} Time and Remanence Decay in {SRAM} to Implement Secure Protocols
                  on Embedded Devices without Clocks},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {221--236},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/rahmati},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RahmatiSHSBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/RansfordSF11,
  author       = {Benjamin Ransford and
                  Jacob Sorber and
                  Kevin Fu},
  editor       = {Rajiv Gupta and
                  Todd C. Mowry},
  title        = {Mementos: system support for long-running computation on RFID-scale
                  devices},
  booktitle    = {Proceedings of the 16th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2011, Newport Beach, CA, USA, March 5-11, 2011},
  pages        = {159--170},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1950365.1950386},
  doi          = {10.1145/1950365.1950386},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/RansfordSF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/SalajeghehWFJL11,
  author       = {Mastooreh Salajegheh and
                  Yue Wang and
                  Kevin Fu and
                  Anxiao Jiang and
                  Erik G. Learned{-}Miller},
  editor       = {Gregory R. Ganger and
                  John Wilkes},
  title        = {Exploiting Half-Wits: Smarter Storage for Low-Power Devices},
  booktitle    = {9th {USENIX} Conference on File and Storage Technologies, San Jose,
                  CA, USA, February 15-17, 2011},
  pages        = {47--60},
  publisher    = {{USENIX}},
  year         = {2011},
  url          = {http://www.usenix.org/events/fast11/tech/techAbstracts.html\#Salajegheh},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/fast/SalajeghehWFJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihealth/ClarkF11,
  author       = {Shane S. Clark and
                  Kevin Fu},
  editor       = {Konstantina S. Nikita and
                  James C. Lin and
                  Dimitrios I. Fotiadis and
                  Mar{\'{\i}}a Teresa Arredondo Waldmeyer},
  title        = {Recent Results in Computer Security for Medical Devices},
  booktitle    = {Wireless Mobile Communication and Healthcare - Second International
                  {ICST} Conference, MobiHealth 2011, Kos Island, Greece, October 5-7,
                  2011. Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {83},
  pages        = {111--118},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29734-2\_16},
  doi          = {10.1007/978-3-642-29734-2\_16},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihealth/ClarkF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GollakotaHRKF11,
  author       = {Shyamnath Gollakota and
                  Haitham Hassanieh and
                  Benjamin Ransford and
                  Dina Katabi and
                  Kevin Fu},
  editor       = {Srinivasan Keshav and
                  J{\"{o}}rg Liebeherr and
                  John W. Byers and
                  Jeffrey C. Mogul},
  title        = {They can hear your heartbeats: non-invasive security for implantable
                  medical devices},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Toronto, ON, Canada, August 15-19, 2011},
  pages        = {2--13},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018436.2018438},
  doi          = {10.1145/2018436.2018438},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/GollakotaHRKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/ZhangSFS11,
  author       = {Hong Zhang and
                  Mastooreh Salajegheh and
                  Kevin Fu and
                  Jacob Sorber},
  editor       = {Ricardo Bianchini and
                  Prabal Dutta},
  title        = {Ekho: bridging the gap between simulation and reality in tiny energy-harvesting
                  sensors},
  booktitle    = {Proceedings of the 4th Workshop on Power-Aware Computing and Systems,
                  HotPower '11, Cascais, Portugal, October 23, 2011},
  pages        = {9:1--9:5},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2039252.2039261},
  doi          = {10.1145/2039252.2039261},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/ZhangSFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HannaRMPBFS11,
  author       = {Steve Hanna and
                  Rolf Rolles and
                  Andres Molina{-}Markham and
                  Pongsin Poosankam and
                  Jeremiah Blocki and
                  Kevin Fu and
                  Dawn Song},
  editor       = {Ben Adida and
                  Umesh Shankar},
  title        = {Take Two Software Updates and See Me in the Morning: The Case for
                  Software Security Evaluations of Medical Devices},
  booktitle    = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11,
                  San Francisco, CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/healthsec11/take-two-software-updates-and-see-me-morning-case-software-security},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HannaRMPBFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Molina-MarkhamDFSI11,
  author       = {Andres Molina{-}Markham and
                  George Danezis and
                  Kevin Fu and
                  Prashant J. Shenoy and
                  David E. Irwin},
  title        = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GummesonCFG10,
  author       = {Jeremy Gummeson and
                  Shane S. Clark and
                  Kevin Fu and
                  Deepak Ganesan},
  editor       = {Sujata Banerjee and
                  Srinivasan Keshav and
                  Alec Wolman},
  title        = {On the limits of effective hybrid micro-energy harvesting on mobile
                  {CRFID} sensors},
  booktitle    = {Proceedings of the 8th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2010), San Francisco, California,
                  USA, June 15-18, 2010},
  pages        = {195--208},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1814433.1814454},
  doi          = {10.1145/1814433.1814454},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GummesonCFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/Molina-MarkhamSFCI10,
  author       = {Andres Molina{-}Markham and
                  Prashant J. Shenoy and
                  Kevin Fu and
                  Emmanuel Cecchet and
                  David E. Irwin},
  editor       = {Antonio G. Ruzzelli},
  title        = {Private memoirs of a smart meter},
  booktitle    = {BuildSys'10, Proceedings of the 2nd {ACM} Workshop on Embedded Sensing
                  Systems for Energy-Efficiency in Buildings, Zurich, Switzerland, November
                  3-5, 2010},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1878431.1878446},
  doi          = {10.1145/1878431.1878446},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/Molina-MarkhamSFCI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010healthsec,
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2010healthsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Fu09,
  author       = {Kevin Fu},
  title        = {Inside risks - Reducing risks of implantable medical devices},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {6},
  pages        = {25--27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516046.1516055},
  doi          = {10.1145/1516046.1516055},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Fu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HolcombBF09,
  author       = {Daniel E. Holcomb and
                  Wayne P. Burleson and
                  Kevin Fu},
  title        = {Power-Up {SRAM} State as an Identifying Fingerprint and Source of
                  True Random Numbers},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {9},
  pages        = {1198--1210},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2008.212},
  doi          = {10.1109/TC.2008.212},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/HolcombBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ClarkGFG09,
  author       = {Shane S. Clark and
                  Jeremy Gummeson and
                  Kevin Fu and
                  Deepak Ganesan},
  editor       = {David E. Culler and
                  Jie Liu and
                  Matt Welsh},
  title        = {Hybrid-powered {RFID} sensor networks},
  booktitle    = {Proceedings of the 7th International Conference on Embedded Networked
                  Sensor Systems, SenSys 2009, Berkeley, California, USA, November 4-6,
                  2009},
  pages        = {345--346},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644038.1644093},
  doi          = {10.1145/1644038.1644093},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ClarkGFG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SalajeghehCRFJ09,
  author       = {Mastooreh Salajegheh and
                  Shane S. Clark and
                  Benjamin Ransford and
                  Kevin Fu and
                  Ari Juels},
  editor       = {Fabian Monrose},
  title        = {{CCCP:} Secure Remote Storage for Computational RFIDs},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {215--230},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/salajegheh.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SalajeghehCRFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/HalperinHFKM08,
  author       = {Daniel Halperin and
                  Thomas S. Heydt{-}Benjamin and
                  Kevin Fu and
                  Tadayoshi Kohno and
                  William H. Maisel},
  title        = {Security and Privacy for Implantable Medical Devices},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {7},
  number       = {1},
  pages        = {30--39},
  year         = {2008},
  url          = {https://doi.org/10.1109/MPRV.2008.16},
  doi          = {10.1109/MPRV.2008.16},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/HalperinHFKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/RansfordCSF08,
  author       = {Benjamin Ransford and
                  Shane S. Clark and
                  Mastooreh Salajegheh and
                  Kevin Fu},
  editor       = {Feng Zhao},
  title        = {Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing
                  and Voltage-Aware Scheduling},
  booktitle    = {Workshop on Power Aware Computing and Systems, HotPower 2008, December
                  7, 2008, San Diego, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotpower08/tech/full\_papers/ransford/ransford.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/RansfordCSF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HalperinHRCDMFKM08,
  author       = {Daniel Halperin and
                  Thomas S. Heydt{-}Benjamin and
                  Benjamin Ransford and
                  Shane S. Clark and
                  Benessa Defend and
                  Will Morgan and
                  Kevin Fu and
                  Tadayoshi Kohno and
                  William H. Maisel},
  title        = {Pacemakers and Implantable Cardiac Defibrillators: Software Radio
                  Attacks and Zero-Power Defenses},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {129--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.31},
  doi          = {10.1109/SP.2008.31},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HalperinHRCDMFKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DenningFK08,
  author       = {Tamara Denning and
                  Kevin Fu and
                  Tadayoshi Kohno},
  editor       = {Niels Provos},
  title        = {Absence Makes the Heart Grow Fonder: New Directions for Implantable
                  Medical Device Security},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/denning/denning.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DenningFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Heydt-BenjaminBFJO07,
  author       = {Thomas S. Heydt{-}Benjamin and
                  Daniel V. Bailey and
                  Kevin Fu and
                  Ari Juels and
                  Tom O'Hare},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Vulnerabilities in First-Generation RFID-enabled Credit Cards},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {2--14},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_2},
  doi          = {10.1007/978-3-540-77366-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Heydt-BenjaminBFJO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Fu07,
  author       = {Kevin Fu},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Panel: {RFID} Security and Privacy},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {45},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_5},
  doi          = {10.1007/978-3-540-77366-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Fu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DefendFJ07,
  author       = {Benessa Defend and
                  Kevin Fu and
                  Ari Juels},
  title        = {Cryptanalysis of Two Lightweight {RFID} Authentication Schemes},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {211--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.34},
  doi          = {10.1109/PERCOMW.2007.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/DefendFJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseFGH06,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved proxy re-encryption schemes with applications to secure distributed
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {1--30},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127346},
  doi          = {10.1145/1127345.1127346},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseFGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/FuKK06,
  author       = {Kevin Fu and
                  Seny Kamara and
                  Yoshi Kohno},
  title        = {Key Regression: Enabling Efficient Key Distribution for Secure Distributed
                  Storage},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/key-regression-enabling-efficient-key-distribution-secure-distributed-storage/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/FuKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/Heydt-BenjaminCDF06,
  author       = {Thomas S. Heydt{-}Benjamin and
                  Hee{-}Jin Chae and
                  Benessa Defend and
                  Kevin Fu},
  editor       = {George Danezis and
                  Philippe Golle},
  title        = {Privacy for Public Transportation},
  booktitle    = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
                  2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4258},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11957454\_1},
  doi          = {10.1007/11957454\_1},
  timestamp    = {Tue, 01 Jun 2021 15:22:32 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/Heydt-BenjaminCDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BellissimoBF06,
  author       = {Anthony Bellissimo and
                  John Burgess and
                  Kevin Fu},
  title        = {Secure Software Updates: Disappointments and New Challenges},
  booktitle    = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
                  BC, Canada, July 31, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/hotsec-06/secure-software-updates-disappointments-and-new-challenges},
  timestamp    = {Mon, 01 Feb 2021 08:43:09 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BellissimoBF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Fu05,
  author       = {Kevin Fu},
  title        = {Integrity and access control in untrusted content distribution networks},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2005},
  url          = {https://hdl.handle.net/1721.1/34464},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Fu05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseFGH05,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
                  Storage},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/improved-proxy-re-encryption-schemes-applications-secure-distributed-storage/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseFGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFGH05,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
                  Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuKK05,
  author       = {Kevin Fu and
                  Seny Kamara and
                  Tadayoshi Kohno},
  title        = {Key Regression: Enabling Efficient Key Distribution for Secure Distributed
                  Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/KaminskyPGFMK04,
  author       = {Michael Kaminsky and
                  Eric Peterson and
                  Daniel B. Giffin and
                  Kevin Fu and
                  David Mazi{\`{e}}res and
                  M. Frans Kaashoek},
  title        = {{REX:} Secure, Extensible Remote Execution},
  booktitle    = {Proceedings of the General Track: 2004 {USENIX} Annual Technical Conference,
                  June 27 - July 2, 2004, Boston Marriott Copley Place, Boston, MA,
                  {USA}},
  pages        = {199--212},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/usenix04/tech/general/kaminsky.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/KaminskyPGFMK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/KallahallaRSWF03,
  author       = {Mahesh Kallahalla and
                  Erik Riedel and
                  Ram Swaminathan and
                  Qian Wang and
                  Kevin Fu},
  editor       = {Jeff Chase},
  title        = {Plutus: Scalable Secure File Sharing on Untrusted Storage},
  booktitle    = {Proceedings of the {FAST} '03 Conference on File and Storage Technologies,
                  March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California,
                  {USA}},
  publisher    = {{USENIX}},
  year         = {2003},
  url          = {http://www.usenix.org/events/fast03/tech/kallahalla.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/KallahallaRSWF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/FuKM02,
  author       = {Kevin Fu and
                  M. Frans Kaashoek and
                  David Mazi{\`{e}}res},
  title        = {Fast and secure distributed read-only file system},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {1--24},
  year         = {2002},
  url          = {https://doi.org/10.1145/505452.505453},
  doi          = {10.1145/505452.505453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/FuKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/FuKM02,
  author       = {Kevin Fu and
                  Michael Kaminsky and
                  David Mazi{\`{e}}res},
  title        = {Using {SFS} for a Secure Network File System},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/using-sfs-secure-network-file-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/FuKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SitF01,
  author       = {Emil Sit and
                  Kevin Fu},
  title        = {Web Cookies: Not Just a Privacy Risk},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {9},
  pages        = {120},
  year         = {2001},
  url          = {https://doi.org/10.1145/383694.383714},
  doi          = {10.1145/383694.383714},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SitF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FuSSF01,
  author       = {Kevin Fu and
                  Emil Sit and
                  Kendra Smith and
                  Nick Feamster},
  editor       = {Dan S. Wallach},
  title        = {The Dos and Don'ts of Client Authentication on the Web},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/fu.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FuSSF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Fu00,
  author       = {Kevin Fu},
  title        = {In Memory of David Huffman},
  journal      = {{ACM} Crossroads},
  volume       = {6},
  number       = {3},
  year         = {2000},
  url          = {https://doi.org/10.1145/331624.331626},
  doi          = {10.1145/331624.331626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/crossroads/Fu00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/FuKM00,
  author       = {Kevin Fu and
                  M. Frans Kaashoek and
                  David Mazi{\`{e}}res},
  editor       = {Michael B. Jones and
                  M. Frans Kaashoek},
  title        = {Fast and Secure Distributed Read-Only File System},
  booktitle    = {4th Symposium on Operating System Design and Implementation {(OSDI}
                  2000), San Diego, California, USA, October 23-25, 2000},
  pages        = {181--196},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {http://dl.acm.org/citation.cfm?id=1251242},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/osdi/FuKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Fu99,
  author       = {Kevin Fu},
  title        = {RTLinux: an interview with Victor Yodaiken},
  journal      = {{XRDS}},
  volume       = {6},
  number       = {1},
  year         = {1999},
  url          = {https://doi.org/10.1145/331636.331647},
  doi          = {10.1145/331636.331647},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Fu99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Fu99a,
  author       = {Kevin Fu},
  title        = {Introduction: format {C}},
  journal      = {{XRDS}},
  volume       = {6},
  number       = {1},
  pages        = {2},
  year         = {1999},
  url          = {https://doi.org/10.1145/331636.331637},
  doi          = {10.1145/331636.331637},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Fu99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Fu98,
  author       = {Kevin Fu},
  title        = {Networks and distributed systems: introduction},
  journal      = {{XRDS}},
  volume       = {5},
  number       = {2},
  pages        = {2},
  year         = {1998},
  url          = {https://doi.org/10.1145/333151.333152},
  doi          = {10.1145/333151.333152},
  timestamp    = {Wed, 04 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Fu98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RubinBF97,
  author       = {Aviel D. Rubin and
                  Dan Boneh and
                  Kevin Fu},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Revocation of Unread E-mail in an Untrusted Network},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027944},
  doi          = {10.1007/BFB0027944},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RubinBF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics