Abbas Acar
Abbas Acar
Home
News
Publications
Contact
Personal
Light
Dark
Automatic
Conference
50 Shades of Support: A Device-Centric Analysis of Android Security Updates
Android is by far the most popular OS with over three billion active mobile devices. As in any software, uncovering vulnerabilities on …
Abbas Acar
,
Güliz Seray Tuncay
,
Esteban Luques
,
Harun Oz
,
Ahmet Aris
,
Selcuk Uluagac
PDF
Cite
Code
Dataset
RøB: Ransomware over Modern Web Browsers
File System Access (FSA) API enables web applications to interact with files on the users’ local devices. Even though it can be used to …
Harun Oz
,
Ahmet Aris
,
Abbas Acar
,
Güliz Seray Tuncay
,
Leonardo Babun
,
Selcuk Uluagac
PDF
Cite
Code
Slides
Video
Forensic Analysis of Cryptojacking in Host-based Docker Containers Using Honeypots
Blockchain-based cryptocurrencies have transformed financial transactions and created opportunities to profit from generating new coins …
Javier Franco
,
Abbas Acar
,
Ahmet Aris
,
Selcuk Uluagac
Cite
A First Look at Code Obfuscation for WebAssembly
WebAssembly (Wasm) has seen a lot of attention lately as it spreads through the mobile computing domain and becomes the new standard …
Shrenik Bhansali
,
Ahmet Aris
,
Abbas Acar
,
Harun Oz
,
Selcuk Uluagac
PDF
Cite
A lightweight IoT cryptojacking detection mechanism in heterogeneous smart home networks
Recently, cryptojacking malware has become an easy way of reaching and profiting from a large number of victims. Prior works studied …
Ege Tekiner
,
Abbas Acar
,
Selcuk Uluagac
PDF
Cite
Code
The truth shall set thee free: Enabling practical forensic capabilities in smart environments
In smart environments such as smart homes and offices, the interaction between devices, users, and apps generate abundant data. Such …
Leonardo Babun
,
Amit Kumar Sikder
,
Abbas Acar
,
Selcuk Uluagac
PDF
Cite
Code
In-Browser Cryptomining for Good: An Untold Story
In-browser cryptomining uses the computational power of a website’s visitors to mine cryptocurrency, i.e., to create new coins. …
Ege Tekiner
,
Abbas Acar
,
Selcuk Uluagac
,
Engin Kirda
,
Ali Aydin Selcuk
PDF
Cite
Code
SoK: Cryptojacking Malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of …
Ege Tekiner
,
Abbas Acar
,
Selcuk Uluagac
,
Engin Kirda
,
Ali Aydin Selcuk
PDF
Cite
Code
Kratos: Multi-user multi-device-aware access control system for the smart home
In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. …
Amit Kumar Sikder
,
Leonardo Babun
,
Z. Berkay Celik
,
Abbas Acar
,
Hidayet Aksu
,
Patrick McDaniel
,
Engin Kirda
,
Selcuk Uluagac
PDF
Cite
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world …
Abbas Acar
,
Hossein Fereidooni
,
Tigist Abera
,
Amit Kumar Sikder
,
Markus Miettinen
,
Hidayet Aksu
,
Mauro Conti
,
Ahmad-Reza Sadeghi
,
Selcuk Uluagac
PDF
Cite
»
Cite
×