default search action
Z. Berkay Celik
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
Physical Side-Channel Attacks against Intermittent Devices. Proc. Priv. Enhancing Technol. 2024(3): 461-476 (2024) - [c48]Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model. NDSS 2024 - [c47]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347 - [c46]Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik:
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. SP 2024: 2404-2421 - [c45]Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik:
ATTention Please! An Investigation of the App Tracking Transparency Permission. USENIX Security Symposium 2024 - [c44]Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu:
SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. USENIX Security Symposium 2024 - [c43]Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik:
Understanding the Security and Privacy Implications of Online Toxic Content on Refugees. USENIX Security Symposium 2024 - [c42]Raymond Muller, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
VOGUES: Validation of Object Guise using Estimated Components. USENIX Security Symposium 2024 - [i22]Claire Le Goues, Sebastian G. Elbaum, David J. Anthony, Z. Berkay Celik, Mauricio Castillo-Effen, Nikolaus Correll, Pooyan Jamshidi, Morgan Quigley, Trenton Tabor, Qi Zhu:
Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics. CoRR abs/2401.12317 (2024) - [i21]Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik:
Rethinking How to Evaluate Language Model Jailbreak. CoRR abs/2404.06407 (2024) - 2023
- [j9]Reham Mohamed, Habiba Farrukh, Yidong Lu, He Wang, Z. Berkay Celik:
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches. Proc. Priv. Enhancing Technol. 2023(2): 79-96 (2023) - [c41]Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. ACSAC 2023: 366-378 - [c40]Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik:
Evasion Attacks and Defenses on Smart Home Physical Event Verification. NDSS 2023 - [c39]Habiba Farrukh, Muslum Ozgur Ozmen, Faik Kerem Örs, Z. Berkay Celik:
One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. SP 2023: 3026-3042 - [c38]Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik:
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality. USENIX Security Symposium 2023: 877-894 - [c37]Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi:
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles. USENIX Security Symposium 2023: 2957-2974 - [c36]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PatchVerif: Discovering Faulty Patches in Robotic Vehicles. USENIX Security Symposium 2023: 3011-3028 - [c35]Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
ZBCAN: A Zero-Byte CAN Defense System. USENIX Security Symposium 2023: 6893-6910 - [c34]Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes:
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency. USENIX Security Symposium 2023: 6929-6946 - [i20]Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. CoRR abs/2310.02431 (2023) - 2022
- [j8]Michael Norris, Z. Berkay Celik, Prasanna Venkatesh Rengasamy, Shulin Zhao, Patrick Drew McDaniel, Anand Sivasubramaniam, Gang Tan:
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments. ACM Trans. Internet Things 3(3): 22:1-22:33 (2022) - [j7]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [c33]Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:
Physical Hijacking Attacks against Object Trackers. CCS 2022: 2309-2322 - [c32]Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. CCS 2022: 2415-2428 - [c31]Upinder Kaur, Z. Berkay Celik, Richard M. Voyles:
Robust and Energy Efficient Malware Detection for Robotic Cyber-Physical Systems. ICCPS 2022: 314-315 - [c30]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. SP 2022: 1826-1844 - [c29]Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi:
SARA: Secure Android Remote Authorization. USENIX Security Symposium 2022: 1561-1578 - [c28]Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik:
Behind the Tube: Exploitative Monetization of Content on YouTube. USENIX Security Symposium 2022: 2171-2188 - 2021
- [j6]Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Networks 192: 108040 (2021) - [j5]Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik:
S3: Side-Channel Attack on Stylus Pencil through Sensors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 8:1-8:25 (2021) - [j4]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. Proc. Priv. Enhancing Technol. 2021(1): 145-166 (2021) - [c27]Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information. IoTDI 2021: 53-66 - [c26]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. KDD 2021: 1027-1035 - [c25]Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. NDSS 2021 - [c24]Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. NDSS 2021 - [c23]Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. SecDev 2021: 38-46 - [c22]Furkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik:
On the Safety Implications of Misordered Events and Commands in IoT Systems. SP (Workshops) 2021: 235-241 - [c21]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [c20]Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. USENIX Security Symposium 2021: 4241-4258 - [i19]Muslum Ozgur Ozmen, Xuansong Li, Andrew Chun-An Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering Physical Interaction Vulnerabilities in IoT Deployments. CoRR abs/2102.01812 (2021) - [i18]Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik:
S3: Side-Channel Attack on Stylus Pencil through Sensors. CoRR abs/2103.05840 (2021) - [i17]Furkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik:
On the Safety Implications of Misordered Events and Commands in IoT Systems. CoRR abs/2105.00645 (2021) - [i16]Siddharth Divi, Habiba Farrukh, Z. Berkay Celik:
Unifying Distillation with Personalization in Federated Learning. CoRR abs/2105.15191 (2021) - [i15]Siddharth Divi, Yi-Shan Lin, Habiba Farrukh, Z. Berkay Celik:
New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning. CoRR abs/2107.13173 (2021) - 2020
- [c19]Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik:
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. CNS 2020: 1-6 - [c18]Michael Norris, Z. Berkay Celik, Prasanna Venkatesh Rengasamy, Shulin Zhao, Patrick D. McDaniel, Anand Sivasubramaniam, Gang Tan:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT. IoTDI 2020: 142-148 - [c17]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i14]Michael Norris, Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Prasanna Venkatesh Rengasamy, Shulin Zhao, Anand Sivasubramaniam:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper). CoRR abs/2002.07641 (2020) - [i13]Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik:
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. CoRR abs/2006.14679 (2020) - [i12]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. CoRR abs/2009.10639 (2020)
2010 – 2019
- 2019
- [j3]Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. ACM Comput. Surv. 52(4): 74:1-74:30 (2019) - [j2]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Leonardo Babun, A. Selcuk Uluagac:
Verifying Internet of Things Safety and Security in Physical Spaces. IEEE Secur. Priv. 17(5): 30-37 (2019) - [c16]Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - [c15]Z. Berkay Celik, Gang Tan, Patrick D. McDaniel:
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. NDSS 2019 - [i11]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i10]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs/1911.10461 (2019) - 2018
- [c14]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. AsiaCCS 2018: 199-206 - [c13]Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. SecureComm (2) 2018: 192-212 - [c12]Z. Berkay Celik, Patrick D. McDaniel:
Extending Detection with Privileged Information via Generalized Distillation. IEEE Symposium on Security and Privacy Workshops 2018: 83-88 - [c11]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. USENIX ATC 2018: 147-158 - [c10]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. USENIX Security Symposium 2018: 1687-1704 - [i9]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. CoRR abs/1802.08307 (2018) - [i8]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. CoRR abs/1805.08876 (2018) - [i7]Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. CoRR abs/1809.06962 (2018) - 2017
- [c9]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Machine Learning. AsiaCCS 2017: 506-519 - [c8]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov:
Feature Cultivation in Privileged Information-augmented Detection. IWSPA@CODASPY 2017: 73-80 - [c7]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. PAC 2017: 1-12 - [c6]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59 - [i6]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017) - [i5]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017) - 2016
- [j1]Patrick D. McDaniel, Nicolas Papernot, Z. Berkay Celik:
Machine Learning in Adversarial Settings. IEEE Secur. Priv. 14(3): 68-72 (2016) - [c5]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. EuroS&P 2016: 372-387 - [c4]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12 - [i4]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. CoRR abs/1602.02697 (2016) - [i3]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ananthram Swami:
Building Better Detection with Privileged Information. CoRR abs/1603.09638 (2016) - [i2]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. CoRR abs/1611.08648 (2016) - 2015
- [c3]Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami:
Malware traffic detection using tamper resistant features. MILCOM 2015: 330-335 - [i1]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. CoRR abs/1511.07528 (2015) - 2013
- [c2]Z. Berkay Celik, Sema Oktug:
Detection of Fast-Flux Networks using various DNS feature sets. ISCC 2013: 868-873 - 2011
- [c1]Z. Berkay Celik, Jayaram Raghuram, George Kesidis, David J. Miller:
Salting Public Traces with Attack Traffic to Test Flow Classifiers. CSET 2011
Coauthor Index
aka: Patrick Drew McDaniel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint